News Category: Networking

NetSpectre Attack Could Enable Remote CPU Exploitation

Researchers from Graz University in Austria released new research on July 26 detailing how the Spectre CPU speculative execution vulnerability could be used over a remote network. In a 14-page report, the researchers dubbed their attack method NetSpectre, which can enable an attacker to read...
Read 0 Comments

ethereum.jpg

ethereum
Ethereum is a blockchain protocol that was created as a platform for the development of decentralized applications; learn more in this overview. (Image via influensive.com)

What is Ethereum?

Ethereum is a blockchain protocol that includes a programming language which allows for applications, called contracts, to run within the blockchain. Initially described in a white paper by its creator, Vitalik Buterin in late 2013, Ethereum was created as a platform for the development of...
Read 0 Comments

IO500 List Showcases World’s Fastest Storage Systems for HPC

In this video from ISC 2018, John Bent and Jay Lofstead describe how the IO500 benchmark measures storage performance in HPC environments. The second IO500 list was revealed at ISC 2018 in Frankfurt, Germany. Following the success of the Top500 in collecting and analyzing historical trends in...
Read 0 Comments

Do You Need a Service Mesh?

Beyond the hype, it’s necessary to understand what a service mesh is and what concrete problems it solves so you can decide whether you might need one. A brief introduction to the service mesh The service mesh is a dedicated infrastructure layer for handling service-to-service communication in...
Read 0 Comments

What Is Distributed Ledger Technology?

  While the concept of distributed ledgers has been around for a long while, it wasn’t until in recent years that it became a reality. The most popular implementation of distributed ledgers is blockchain, the technology that supports cryptocurrencies such as bitcoin and ethereum. Blockchain uses...
Read 0 Comments

How Developers Can Get Involved with Open Source Networking

Linux Foundation open networking leader describes the challenges and advantages of working across communities. There have always been integration challenges with open source software, whether in pulling together Linux distributions or in mating program subsystems developed by geographically...
Read 0 Comments

New IEEE Position Statement Supports Strong Encryption

On 24 June, the IEEE Board of Directors adopted a position statement in support of strong encryption for confidentiality and data integrity.  The essence of the position is that: “IEEE supports the use of unfettered strong encryption to protect confidentiality and integrity of data and...
Read 0 Comments

Wi-Fi Security Is Starting to Get its Biggest Upgrade in Over a Decade

Wi-Fi devices have been using the same security protocol for over a decade. But today, that’ll begin to change: the Wi-Fi Alliance, which oversees adoption of the Wi-Fi standard, is beginning to certify products that support WPA3, the successor to the WPA2 security protocol that’s been in use since...
Read 0 Comments

Netdev Day 1: IPsec!

Today at the conference I learned a lot about IPsec, so we’re going to talk about IPsec! There was an IPsec workshop given by Sowmini Varadhan and Paul Wouters. All of the mistakes in this post are 100% my fault though :). what’s IPsec? IPsec is a protocol used to encrypt IP packets. Some VPNs are...
Read 0 Comments

A SysAdmin's Guide to Network Management

If you're a sysadmin, your daily tasks include managing servers and the data center's network. The following Linux utilities and commands—from basic to advanced—will help make network management easier. In several of these commands, you'll see <fqdn>, which stands for "fully qualified domain...
Read 0 Comments

Pages

Click Here!