ICANN sets plan to reinforce Internet DNS security

In a few months, the Internet will be a more secure place. 

That’s because the Internet Corporation for Assigned Names and Numbers (ICANN) has voted to go ahead with the first-ever changing of the cryptographic key that helps protect the Internet’s address book – the Domain Name System (DNS). 

The ICANN Board at its meeting in Belgium this week, decided to proceed with its plans to change or “roll” the key for the DNS root on October 11, 2018. It will mark the first time the key has been changed since it was first put in place in 2010.

To read this article in full, please click here

Source: Network World

Prep for Cisco, CompTIA, and More IT Certifications With This $39 Bundle

Large companies need to maintain a robust IT infrastructure if they want to thrive in the digital age, and they can’t accomplish this without certified IT professionals. Luckily, traditional schooling isn’t necessary to land an IT job; IT professionals simply need to pass their certification exams, and they can do so thanks to the wealth of training courses available. One such resource is this Ultimate IT Certification Training Bundle, which is currently on sale for $39.

To read this article in full, please click here

Source: Network World

Hybrid IoT communications could be the best option

Using a sole communications technology doesn’t make sense in many Internet of Things (IoT) implementations, says connectivity vendor Sigfox.

In fact, the company, which provides Low Power Wide Area (LPWA) networks, says one could use a hybrid that includes an unlicensed LPWA network along with a licensed, cellular LTE narrowband IoT (NB-IoT) or LTE Cat M1 network solution instead. That way you can support cheap, unlicensed IoT short messaging close up, as is offered by Sigfox and others, and then offload the sensor traffic to more expensive, licensed LTE cellular mobile networks as the devices move off home base, such as what happens in asset tracking, Sigfox says.

To read this article in full, please click here

Source: Network World

BrandPost: Security and the Cloud Go Hand-in-Hand: Are You Prepared?

Just because you’ve tapped into the vast resources of a cloud service provider to replace previously on-premises IT assets doesn’t lessen your management or cybersecurity burden. In fact, cloud migration creates new issues for network admins to focus on: migrations are inherently risky from a cyber perspective – data on the move is data that can be exploited in transit.

Cloud providers are prone to proclaiming that their security is better than any single business can achieve, simply because they have more resources to apply to the issue. By now, we all know that simply throwing money at the challenge is no guarantee of success, so maybe take that with a dose of skepticism.

To read this article in full, please click here

Source: Network World

AMD plots its move against Intel in the data center

Smelling blood in the water, a revitalized AMD is preparing for a big push against Intel in the data center, hoping to win back the market share it gained and lost a decade ago.

AMD is promoting its Epyc processors, with 16 or 32 cores, as a lower TCO, higher performance option than Intel’s Xeon. It argues a single-socket 32-core server is cheaper up front and in the long run than a dual socket setup, which is Intel’s bread and butter.

“We’re not saying single socket is for everyone, but at the heart of the market is where 50 percent to 80 percent are 32 cores per server and down, and our top single socket can do it more efficiently with lower costs and licensing. But in some cases some people will want to stay at two-socket,” said Glen Keels, director of product and segment marketing for data center products at AMD.

To read this article in full, please click here

Source: Network World

Scale Computing, APC partner to offer micro data center in a box

Hyperconverged infrastructure (HCI) vendor Scale Computing and power management specialist APC (formerly American Power Conversion, now owned by Schneider Electric) have partnered to offer a range of turnkey micro data centers for the North American market.

The platform combines Scale’s hyperconverged software, HC3 HyperCore, running on top of its own hardware and built on APC’s ready-to-deploy racks for a micro data center. Micro will sell the platform as a single SKU.

The pre-packaged platform is entirely turnkey, with automated virtualization, power management resources, and built-in redundancy. This makes it well-suited for remote edge locations, such as cell phone towers, where staff is not immediately available to maintain the equipment.

To read this article in full, please click here

Source: Network World

IDG Contributor Network: Zero Trust Networking (ZTN): don’t trust anything

John Kindervag, a former analyst from Forrester Research, was the first to introduce the Zero-Trust model back in 2010. The focus then was more on the application layer. However, once I heard that Sorell Slaymaker from Techvision Research was pushing the topic at the network level, I couldn’t resist giving him a call to discuss the generals on Zero Trust Networking (ZTN). During the conversation, he shone a light on numerous known and unknown facts about Zero Trust Networking that could prove useful to anyone. 

The traditional world of networking started with static domains. The classical network model divided clients and users into two groups – trusted and untrusted. The trusted are those inside the internal network, the untrusted are external to the network, which could be either mobile users or partner networks. To recast the untrusted to become trusted, one would typically use a virtual private network (VPN) to access the internal network.

To read this article in full, please click here

Source: Network World

How to list repositories on Linux

A Linux repository is a storage location from which your system retrieves and installs OS updates and applications. Each repository is a collection of software hosted on a remote server and intended to be used for installing and updating software packages on Linux systems. When you run commands such as “sudo apt update” or “sudo apt upgrade”, you may be pulling package information and package updates from a number of repositories.

Repositories contain thousands of programs. Standard repositories provide a high degree of security since the software included is thoroughly tested and built to be compatible with a particular distribution and version. So you can expect the updates to occur with no unexpected “side effects”.

To read this article in full, please click here

Source: Network World

How we did it: 10 hot hybrid-cloud startups to watch

The selection process for our 10 hot hybrid-cloud startups to watch roundup began with 42 recommendations and nominations that came to me via HARO, LinkedIn, Twitter and subscribers to my Startup50 email newsletter.

For this roundup, we focused on hybrid-cloud infrastructure and hybrid-cloud-enabling technologies. Thus, cloud-delivered applications that don’t enable clouds but, rather, rely on them, were eliminated. We also eliminated cloud security startups because they belong in their own roundup or in a security roundup.

This left me with 23 startups. The next set of cuts were the easiest ones. Startups that were slow to respond to questions – missing deadlines and forcing me to chase them down just to get answers to my questions – were eliminated.

To read this article in full, please click here

Source: Network World

Is predictive maintenance the ‘gateway drug’ to the Industrial IoT?

I’ve said it before, but it bears repeating: When it comes to the Internet of Things (IoT), the consumer market gets all the attention, but the real action may be in industrial applications, the so-called Industrial Internet of Things (IIoT).

The IIoT is a huge market, and it’s based more on clearly defined cost savings than the always-fickle consumer preferences that seem to rule the consumer market. It also requires highly available infrastructure to connect everything and avoid expensive downtime — one reason why investment in IIoT firms has been hot this summer, with investments in companies such as Seeq, Element Analytics, Trendminer, Falkonry, and Toumetis.

To read this article in full, please click here

Source: Network World