Category Archives: Tech

After Heartbleed, Comodo cranks out new SSL certificates

Comodo’s chief technology officer warns it is still very early in the remediation processTens of thousands of new digital certificates have been issued by Comodo in the wake of the “Heartbleed” security flaw, which has put Internet users’ data at … Continue reading

Posted in Tech | Tagged , , , , , | Comments Off

11 tips to prepare for SDN

Software-Defined Networking game plan: Education, education, education… including a good understanding of your current network. Making the leap to SDN? Don’t jump in blind. It helps to know what software-defined networking is, first off, and then what it can do … Continue reading

Posted in Tech | Tagged , , , , , , , , | Comments Off

CV0-001 CompTIA Cloud+ Certification Exam

QUESTION 1 Which of the following is MOST important when factoring network level security in a public cloud environment? A. Ensuring good user experience B. Ensuring confidentiality C. Ensuring redundancy D. Ensuring high availability Answer: B Explanation: QUESTION 2 Which … Continue reading

Posted in Tech | Tagged , , , , | Comments Off

6 tips for smartphone privacy and security

Computer forensic expert Ronald Kaplan thinks you should stop using your smartphone if you want any semblance of privacy in today’s digital world. But, if you insist on keeping yourself electronically tethered, here are some ways to minimize the privacy … Continue reading

Posted in Security+, Tech | Tagged , , , , , , , , , , , | Comments Off

iPhone 6 rumor rollup for the week ending Feb. 21

Sapphire still gleaming, what’s in a name, without delay Sapphires are the iOSphere’s new best friend when it comes to iPhone 6. It used to be quad-core processors and Liquidmetal bodies. Based largely on Apple’s massive investment in GTAT’s sapphire … Continue reading

Posted in Apple, Tech | Tagged , , , , | Comments Off

11 sure signs you’ve been hacked

In today’s threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. … Continue reading

Posted in Tech | Tagged , , | Comments Off

OpenDaylight’s delayed SDN now available

Different versions can be downloaded for enterprises, service providers, academia OpenDaylight, the vendor-heavy consortium developing an open source SDN framework, has announced that its first software release is available for download. OpenDaylight’s “Hydrogen” release was initially scheduled to come out … Continue reading

Posted in Tech | Tagged , , , , | Comments Off

What to Look for When Hiring Social Media Tech Talent in 2014

Social media professionals need to have a specific set of communication and technical skills as well as varied experience if you expect them to be a strategic part of your business in 2014. As social media evolves to become a … Continue reading

Posted in Tech | Tagged , , , , , , , | Comments Off

Who got the payoff for reclassifying cable data services as information services?

Sow for yourselves righteous policies; reap steadfast jobs. In all the commentary about the recent decision by the United States Court of Appeals for the District of Columbia which struck down the 2010 Net Neutrality order by the Federal Communications … Continue reading

Posted in Tech | Tagged , , , , , | Comments Off

Juniper should reevaluate switching, security products investor says

Juniper should review strategic options after mis-executing strategy Juniper’s switching and security products are underperforming in the market, says an investor recommending the company review strategic options for those offerings. Elliott Management, which owns 6.2% of Juniper, says the company … Continue reading

Posted in Tech | Tagged , , , , , | Comments Off

Meet WISP, the wireless future of Internet service

No cable or phone line required. No satellite lag. Traditional ISPs should be nervous. The Internet connection we all rely on is about to change, now that WISP is coming to town. Most people get Internet service from either a … Continue reading

Posted in Tech | Tagged , , , , , | Comments Off

5 steps for application security

The software development lifecycle can be a double-edged sword. On one hand, software needs to be developed with usability in mind, and it needs to be produced quickly. On the other hand, it also needs to maintain a solid security … Continue reading

Posted in Tech | Tagged , , , | Comments Off

eye-popping Black Friday tablet, computer & tech deals

eye-popping Black Friday tablet, computer & tech deals Apple iPads, latest Android and Windows machines all in for big discounts. Oh, and free snow globes. Retailers large and small started leaking their Black Friday circulars even before trick-or-treating began this … Continue reading

Posted in Tech | Tagged , , | Comments Off

Products of the week 11.11.13

Our roundup of intriguing new products from companies such as Radware and NetMotion Our roundup of intriguing new products. Read how to submit an entry to Network World’s products of the week slideshow. Product name: RAM 6021 industrial router Key … Continue reading

Posted in Tech | Tagged , , | Comments Off

Manufacturers building security flaws into Android smartphones

North Carolina State University study finds that companies like Samsung and HTC create vulnerabilities while customizing phones Android smartphone manufacturers that customize their devices to make them standout in the market are compromising security by building vulnerabilities into the products, … Continue reading

Posted in Tech | Tagged , , , , , , | Comments Off