News Category: Networking

npm Best Practices - Node.js at Scale

With our new series, called Node.js at Scale, we are creating a collection of articles focusing on the needs of companies with bigger Node.js installations, and developers who already learned the basics of Node. In the first chapter of Node.js at Scale you are going to learn the best practices on...
Read 0 Comments

Davos 2017: China Unites 25 Countries to Establish Global Blockchain Business Council

...The national representatives provided their progress in blockchain research in detail and reached initial consensus in the fields of global blockchain teaching, business cooperation, standard synergy, and governmental communications on the first conference of GBBC. In industry, the layout of...
Read 0 Comments

ntp-time.jpg

NTP
In this first of a three-part series, Chris Binnie looks at why NTP services are essential to a happy infrastructure.

Arrive On Time With NTP -- Part 1: Usage Overview

Few services on the Internet can claim to be so critical in nature as time. Subtle issues which affect the timekeeping of your systems can sometimes take a day or two to be realized, and they are almost always unwelcome because of the knock-on effects they cause. Consider as an example that your...
Read 0 Comments

A Quick Guide to Network Administrator Course and Jobs

A career in network administration is full of opportunities today. With the world becoming more digitalized and the emergence of a booming IT industry, there are countless new prospects and jobs being shaped every year. With the increase in computer and software led companies, there is an even...
Read 0 Comments

lets-encrypt-security.jpg

Let's Encrypt
We’re incredibly close to a Web that is more encrypted than not, says Josh Aas in this update from the Let’s Encrypt project.

3 Lessons in Web Encryption from Let’s Encrypt

As exciting as 2016 was for encryption on the Web, 2017 seems set to be an even more incredible year. Much of the infrastructure and many of the plans necessary for a 100 percent  encrypted Web really solidified in 2016, and the Web will reap the rewards in 2017. Let’s Encrypt is proud to have been...
Read 0 Comments

Google Ventures into Public Key Encryption

Google's Key Transparency project offers a model of a public lookup service for encryption keys. Google announced an early prototype of Key Transparency, its latest open source effort to ensure simpler, safer, and secure communications for everyone. The project’s goal is to make it easier for...
Read 0 Comments

Mobile Edge Computing Creates ‘Tiny Data Centers’ at the Edge

One key element of 5G is likely to be Mobile Edge Computing (MEC), an emerging standard that extends virtualized infrastructure into the radio access network (RAN). ETSI has created a separate working group for it — the ETSI MEC ISG — with about 80 companies involved.  “MEC uses a lot of NFV ...
Read 0 Comments

marcel-holtmann-elc.png

Marcel Holtmann
“We decided to create a wireless daemon that actually works on IoT devices,” said Intel's Marcel Holtmann in a presentation at Embedded Linux Conference Europe.

New Linux WiFi Daemon Streamlines Networking Stack

If you’ve ever used an embedded Linux development device with wireless networking, you’ve likely benefited from the work of Marcel Holtmann, the maintainer of the BlueZ Bluetooth daemon since 2004, who spoke at an Embedded Linux Conference Europe panel in October. In 2007 Holtmann joined Intel’s...
Read 0 Comments

Continuous Delivery of a Microservice Architecture using Concourse.ci, Cloud Foundry and Artifactory

This comprehensive tutorial takes a simple microservice architecture and explains how to setup a concourse pipeline in order to test and deploy single microservices independently without affecting the overall microservice system. Cloud Foundry will be used as a platform to which the microservices...
Read 0 Comments

The Basics of Web Application Security

We discussed how authentication establishes the identity of a user or system (sometimes referred to as a principal or actor). Until that identity is used to assess whether an operation should be permitted or denied, it doesn't provide much value. This process of enforcing what is and is not...
Read 0 Comments

Pages

Click Here!