OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
LinuxInsider.com
Connected Cloud Summit
If the Internet Could Speak: 'I'm Melting! Melting!'
August 14, 2014
Millions of users were unable to access the Web Tuesday, according to reports. The websites of eBay, Amazon, Autotrader, LinkedIn, Time Warner and Verizon were among those hit. The problem is due to a combination of factors: router configuration; the explosive growth of connected devices; and IPv4 running out of addresses. "The industry faces many limitations," said tech analyst Rob Enderle.
Feds Struggle to Corral Data
August 11, 2014
U.S. government agencies are struggling to manage the huge amount of data they generate or process, despite the goals of a program designed to operate thousands of data centers more efficiently. The idea behind the FDCCI was to save space, energy and IT costs by consolidating woefully underutilized electronic data storage centers into fewer sites and servers.
Taking the Temperature of Java App Security
August 11, 2014
Current approaches to Java application protection place security at the application or the network layer, both of which are problematic. The first approach has proven to be too complex, too time consuming and too risky -- in other words, "too hot." Meanwhile, network level security that consists of perimeter devices lacks the intelligence to know what's going on inside the application.
Apple's Big Blue Dilemma
August 05, 2014
Apple reportedly is gearing up to do what it does best -- introduce a new gadget or two. Word is the company will hold a spellbinding iPhone event come Sept. 9. With the dust not quite settled over Apple's recently announced liaison with IBM, it will be interesting to see whether there are any new corporate nuances in the upcoming presentation. Will Apple maintain its strong consumer focus?
Failure to Communicate Hamstrings Cyberdefenders
July 23, 2014
A failure to communicate between security pros and company brass may be contributing to the inability of a significant number of organizations to reduce the risk of cyberattacks on their systems. Thirty-one percent of the nearly 5,000 respondents surveyed for a recent study said their cybersecurity team never met with the executive team about cybersecurity.
Cloud App Security: Foggy With Low Visibility
July 21, 2014
While the cloud promises faster time to market and reduced costs, it also presents a new landscape for hackers to attack and achieve their goals -- namely, to find and gain unauthorized access to data and information. Attackers follow the data they are after, and if that data is residing in the cloud, then they are going to start operating in the cloud as well.
5 Myths of Virtualization Security: You May Be More Vulnerable Than You Think
June 11, 2014
Businesses increasingly are relying on virtual machines to handle more critical data and tasks than ever before. The reality is that virtualization is growing as a platform for managing customer data, financial transactions and the applications that businesses use. Simply put, virtualization is a core component of today's mission-critical IT infrastructure.
Easing Linux Into the Enterprise
May 22, 2014
The pulling points for migrating either to the Linux desktop or the Linux server often are reduced to two things. One is the cost of not migrating. The other is a decision to deploy Linux gradually -- or entirely -- throughout the office infrastructure. Individuals and businesses migrate to Linux for a variety of reasons. Some do it for cost efficiency -- others for greater flexibility.
Network Upgrades Key to Federal IT Agenda
May 21, 2014
The U.S. government could save billions of dollars in the management of IT resources by significantly improving outdated and overworked networks. Federal agencies are making progress on a series of five key IT initiatives designed to improve the management of IT resources: data consolidation, virtualization, cloud computing, remote access and infrastructure diversification.
Hiring Linux to Run Your Small Business
May 15, 2014
Individuals and businesses migrate to Linux for a variety of reasons. Disgust with Microsoft or Apple regimentation and software limitations are but two of them. For some, the greater flexibility that comes from open source software, as well as better cost and productivity controls, are the driving factors for a move to the Linux OS. The benefits vary depending on the use case.
Case Study: Software Security Pays Off for Heartland
May 14, 2014
Heartland Payment Systems has successfully leveraged software-assurance tools and best practices to drive better security within its IT organization -- and improve its overall business performance. In this podcast, Ashwin Altekar, director of enterprise risk management at Heartland, shares his insights and knowledge with Amir Hartman, the founder and managing director at MainStay.
Linux Pros' Top Command Line Secrets
May 12, 2014
It was a relatively quiet week here in the Linux blogosphere, giving residents a long-overdue opportunity to enjoy a few Tequila Tux cocktails and take stock of all the FOSS-related happenings that have taken place over the past few weeks. Among the highlights were the awarding of the IEEE Computer Society's 2014 Computer Pioneer Award to none other than Linus Torvalds.
Internet Leeches Drawn to Heartbleed
April 14, 2014
It's been more than a week since news of the Heartbleed flaw launched a frantic scramble on the Web, but security professionals' palpitations haven't subsided. The OpenSSL Software Foundation has issued a fix, and Google, Cisco, and hordes of other companies have begun patching their products. Predictably, scammers and spammers have climbed onto the Heartbleed solution bandwagon.
XP Users Have a Bad Headache Coming On
April 07, 2014
Money will be the biggest problem users of Windows XP will face when Microsoft officially stops supporting it on Tuesday. As a last resort, Microsoft is offering custom support for Windows XP as a temporary stopgap. That could cost as much as $200 per PC per year, Gartner estimated. The UK government reportedly has paid Microsoft about $9 million to extend Windows XP support for one year.
Clock Counting Down on Windows XP Support
April 01, 2014
As Microsoft prepares to cut off support for Windows XP, hackers are sharpening their knives in anticipation of carving up the operating system's carcass. Web predators will pounce on XP 10 minutes after Microsoft pulls the support plug on the software, predicted one former military computer specialist and network engineer. Indeed, it appears that information highwaymen are stockpiling ammunition.
Easing DevOps Snafus in the Cloud Era
February 21, 2014
As developers are pressured to produce mobile and distributed cloud apps ever faster and with more network unknowns, the older methods of software quality control can lack sufficient predictability. And as Agile development means faster iterations and a constant stream of updates, newer means of automated testing of the apps in near-production realism prove increasingly valuable.
Google May Let 34 More Cities Munch on Fiber
February 20, 2014
Google has revealed plans to expand its Google Fiber Internet service to as many as 34 new cities. Google Fiber offers connection speeds of up to 1,000 Mbps -- around 100 times faster than the average U.S. speeds of 9.8 Mb/sec, according to Akamai -- by providing service through fiber-optic cables instead of copper wiring. Google's service also delivers high-definition television.
Feds' Shift to Mobile Creates Security Cracks
February 05, 2014
Federal employees quickly have become strong adherents of mobile devices. In a recent survey, 90 percent of government employees said they used at least one mobile device -- laptop, smartphone or tablet -- for work purposes. However, the enthusiasm by federal workers for the use of mobile devices has not been matched by appropriate concerns for security.
Target Fiasco Shines Light on Supply Chain Attacks
February 03, 2014
The holiday data breach at Target was opened up with stolen credentials from a vendor in the company's supply chain, according to reports that surfaced last week. That kind of attack is getting more and more common these days. "About 80 percent of data breaches originate in the supply chain," said Torsten George, vice president of marketing for Agiliance.
IT Weaknesses Paved the Way for Target Hackers
January 30, 2014
The Target data breach exposed more than 100 million customers, riled up U.S. intelligence agencies, sparked a Justice Department investigation, involved the U.S. Department of Homeland Security and the FBI, triggered congressional hearings, and led several banks to re-issue their credit cards. The hacker has variously been identified as a 17-year-old Russian or one or more other cybercriminals.
Google Joins Enterprise Cloud Slugfest in Earnest
December 03, 2013
The Google Compute Engine became generally available on Tuesday, almost 18 months after its introduction at last year's Google I/O. "We have been taking time and doing careful work to ensure that as we open Compute Engine to developers, they have a great experience with things like billing and support, tools, and our operating system support," said Google spokesperson Elizabeth Markman.
NSA's Malware Infection Spree Leaves Network Managers Powerless
November 26, 2013
The United States National Security Agency reportedly has seeded 50,000 networks worldwide with malware designed to steal sensitive information. The report -- the latest in a series of published disclosures based on documents released by Snowden -- is likely to fuel the controversy raging around cybersurveillance by the U.S. and its allies -- the UK, Australia, New Zealand and Canada.

See More Articles in Network Management Section >>
Facebook Twitter LinkedIn Google+ RSS