The company’s new desktop virtualization service could prove a gateway to a post-PC, mobile, and cloud-centric future.
Network Computing
Permanent link to this post (20 words, estimated 5 secs reading time)
Categories: General.
Tags: 'WorkSpaces', Amazon, Demise, PC's, Speeds
By IPHere —
November 18, 2013 at 6:14 pm Thanks to McDonald’s and Starbucks, free wireless networking is available every 200 yards or so, at least in metropolitan areas of the United States. Still, many merchants—especially smaller “mom & pop” establishments—don’t provide the service. Purple WiFi has a business model that can help these businesses offer free Wi-Fi, and seems like a win-win for both the business and the customers.
This is a preview of
Purple WiFi lets businesses trade free wireless for valuable customer data
.
Read the full post (294 words, 1 image, estimated 1:11 mins reading time) Categories: General.
Tags: Businesses, Customer, data, Free, Lets, Purple, Trade, valuable, WiFi, Wireless
By IPHere —
November 18, 2013 at 12:13 pm
Ongoing efforts to beef up the security of the Internet’s underlying protocols may have gotten a major boost, thanks to the National Security Agency (NSA).
Officials from the Internet Engineering Task Force (IETF) today said last week’s plenary meeting of the body charged with developing protocols for the Net was dominated with talk of better securing the Internet to thwart wide-scale surveillance akin to those programs leaked by former NSA contractor Edward Snowden.
This is a preview of
NSA Leaks Bolster IETF Work On Internet Security
.
Read the full post (152 words, estimated 36 secs reading time)Categories: General.
Tags: Bolster, IETF, Internet, Leaks, Security, Work
By IPHere —
November 16, 2013 at 12:12 am Facebook-led effort to develop an open, operating-system agnostic switch makes progress with contributions from Broadcom, Intel, Mellanox, and Cumulus Networks.
Network Computing
Permanent link to this post (23 words, estimated 6 secs reading time)
Categories: General.
Tags: Compute, Considers, Open, Project, Specs, Switch
By IPHere —
November 15, 2013 at 6:13 pm Security teams are often left out of application planning, but should be involved in projects from the start for the best results.
Network Computing
Permanent link to this post (25 words, estimated 6 secs reading time)
Categories: General.
Tags: Administration, Application, Firewall, Part, Planning, Sysadmins
By IPHere —
November 15, 2013 at 12:16 pm
Amazon Web Services announced Wednesday that it is entering the desktop virtualization market and will offer Amazon WorkSpaces — Windows-based desktops — from its cloud servers. Amazon Workspaces were introduced during a keynote talk by Andy Jassy, senior VP, at Re:Invent, AWS’ annual event for around 9,000 developers, partners, and customers in Las Vegas.
This is a preview of
Amazon Launches ‘WorkSpaces’ For Desktop Users
.
Read the full post (208 words, estimated 50 secs reading time)Categories: General.
Tags: 'WorkSpaces', Amazon, Desktop, Launches, users
By IPHere —
November 15, 2013 at 6:14 am Understanding firewall architectures, how firewalls track the state of traffic flow, and why directionality matters will help sysadmins work better with the network security team.
Network Computing
Permanent link to this post (28 words, estimated 7 secs reading time)
Categories: General.
Tags: Administration, Concepts, Firewall, Part, Sysadmins
By IPHere —
November 14, 2013 at 6:15 pm Do we need anti-harassment policies to protect women and other minorities in IT? Unfortunately, yes. But the most successful STEM women are those who ignore their detractors and risk being labeled a “bitch,” confronting challenges head-on.
Network Computing
Permanent link to this post (39 words, estimated 9 secs reading time)
Categories: General.
Tags: Bitch, Silently, Suffer, Women
By IPHere —
November 14, 2013 at 12:19 pm
When David Bianco examined a company’s Web browsing logs, it did not take long for a pattern to appear.
At regular periods, nearly a dozen systems across the network would all request data from the same Web page. Because the company, who Bianco declined to name, captured network data, additional analysis revealed that all of the suspicious systems downloaded small binaries. By running those executables in a virtual machine, Bianco, a network hunter, was able to identify the cause of the problem — an attacker using specialized malware.
This is a preview of
From Event Gatherers To Network Hunters
.
Read the full post (206 words, estimated 49 secs reading time)Categories: General.
Tags: Event, from, Gatherers, Hunters, Network
By IPHere —
November 14, 2013 at 6:14 am
Pivotal, the spinoff from VMware and EMC, has issued its Pivotal One Platform, an integrated assembly of open source software for building next-generation cloud applications.
Its cornerstone is Cloud Foundry, an open source, platform-as-a-service available in the cloud on top of Amazon Web Services and now in a downloadable, supported version in Pivotal One. In addition to a multilanguage development environment (Node.js, Ruby, Java, .Net), the platform comes with four services that might be considered the basics of future large-scale applications: Hadoop big data handling, an analytics service, messaging, and a relational database service.
This is a preview of
VMware, EMC’s Pivotal Launches Cloud App Development Platform
.
Read the full post (156 words, estimated 37 secs reading time)Categories: General.
Tags: Cloud, Development, EMC's, Launches, Pivotal, Platform, VMware
By IPHere —
November 14, 2013 at 12:14 am