Login
Password
Sources on this Page

> Headlines by Category

 Home / Technology / Networking & Communications / LAN / WAN

You are using the plain HTML view, switch to advanced view for a more complete experience.

16 Terminal commands every user should know
Jesus Vigo curates a list of entry-level operational commands aimed at understanding and using Terminal.
Stock-market jitters have rocked network spending, Cisco says

The world's financial markets got off to such a rough start this year that some enterprises froze plans to upgrade their campus networks.

After oil prices and stock markets around the globe plunged during the first trading days of the year, there was a slowdown in spending that hurt Cisco Systems results and colored its forecast for the current quarter, CEO Chuck Robbins said Wednesday.

"You see customers say, 'I want to just wait, see what's going on,'" Robbins said on a conference call about Cisco's fiscal second quarter, which ended Jan. 23.

The report was a reminder that what happens in financial markets can echo in IT departments if business management fears shrinking sales or a falling stock price ahead. Cisco has a different financial calendar than most other IT companies and is one of the first to report on a quarter that spilled over into this calendar year. It's the world's dominant supplier of networks.

To read this article in full or to leave a comment, please click here

Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking

Cisco Systems patched a critical vulnerability that could allow remote attackers to take over Cisco Adaptive Security Appliance (ASA) firewalls configured as virtual private network servers by simply sending malformed network packets to them.

For devices that are designed to protect private networks from Internet attacks, this is as bad as it gets. That's why Cisco rated the vulnerability with the maximum score of 10 in the Common Vulnerability Scoring System.

The flaw is located in the Cisco ASA code that handles the Internet Key Exchange version 1 (IKEv1) and IKE version 2 (IKEv2) protocols. More precisely, it stems from a buffer overflow condition in the function that processes fragmented IKE payloads.

To read this article in full or to leave a comment, please click here

Put data scientists' skills to excellent use in mission-critical scenarios
Don't overlook the value of having a data science team play an operational role at your company. Here are three steps to follow when assigning analysts to these roles.
SD-WAN: What it is and why you’ll use it one day

Managing the Wide Area Network (WAN) for Redmond Inc., a supplier of industrial and commercial products – from salt that’s used to protect winter roadways to organic dairy products and health items – is an easier job today for the company’s technical project manager Aaron Gabrielson than it was a year ago.

Redmond manages a phone system, point of sale and fax centrally out of headquarters in Heber City, Utah, which means each of Redmond’s 10 branch sites across the Midwest need a reliable connection back to headquarters in Utah. That’s easier for some sites, like those in Salt Lake City, than others, such as rural areas where there may only be a handful of workers on a farm.

To read this article in full or to leave a comment, please click here

Super Bowl 50 smashes data records with 10.1TB flying across Wi-Fi
The amount of data used during Super Bowl 50 at Levi's Stadium crushes previous records, with more than 10 terabytes transferred over the stadium's Wi-Fi network on game day.
Super Bowl 50 smashes data records with 10.1TB flying across Wi-Fi
The amount of data used during Super Bowl 50 at Levi's Stadium crushes previous records, with more than 10 terabytes transferred over the stadium's Wi-Fi network on game day.








Super Bowl 50 smashes data records with 10.1TB flying across Wi-Fi
The amount of data used during Super Bowl 50 at Levi's Stadium crushes previous records, with more than 10 terabytes transferred over the stadium's Wi-Fi network on game day.








Retired IT specialist shares inside story of botched National Park Moose project

You might think that a niche conference on cabling design and installation held in Orlando in February would be a sleepy little affair, but I found just the opposite to be true.

The table setter when I arrived was a humorous/informative look by Ekahau's Jussi Kiviniemi at designing Wi-Fi networks for high capacity. The presenter compared such network installation and design to that of setting up a bar, but also made pointed observations about the conference center’s own imperfect Wi-Fi installation history.

The next presentation (“The Moose Project: What Went Wrong? An ICT Case Study from the National Park Service”) was as fiery a talk at a tech conference as I’ve ever heard. Recently retired National Park Service IT specialist Michael Thornton emphasized that he didn’t want to “bash anybody or point fingers” over what he described as a systemic problem with architectural, engineering and construction (AEC) projects, but at the same time he is urging fellow members of the information and communications technology field (ICT) to rise up and convince organizations that ICT pros need to be included in project plans from the start – or else risk botching those projects and wasting millions of dollars.

To read this article in full or to leave a comment, please click here

Office 365 expands Delve features for organizing collaboration
Microsoft has released a new feature for Office 365 Delve to simplify organized team collaboration. But is it too much of a good thing?
Post Selected Items to:

Showing 10 items of 114

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   Official PR partner PRNews.io •   © 1999-2016 NewsKnowledge