Prevent man-in-the-middle attacks with DHCP snooping

A number of devastating attacks can be instigated by spoofing messages for some of the most fundamental network protocols, such as DHCP. For example, through DHCP spoofing, an attacker can create a fake DHCP server that’s privy to information it’s not supposed to have. This allows the attacker to carry out a man-in-the-middle attack to…

Details

Have it both ways with CDNs and local copies

Many websites use CDNs (Content Delivery Networks) to load external libraries and frameworks, on the theory that this will speed up performance, since the CDN resource may already be cached on the user’s machine. Unfortunately, this approach can backfire if there are connection problems that temporarily make the CDN unreachable. Fortunately, you can easily get…

Details

Moderating a presentation with multiple speakers

There are times when you have to share the spotlight with one or more fellow presenters. If it falls to you to act as moderator, here are a few points to keep in mind: 1. Plan a general outline for the presentation and alert each presenter of your need to do so. This will push…

Details

Dispelling the myths about POST and PUT

One of the most common myths about HTTP and REST Oriented Architecture is to think of the use of POST and PUT in terms of which one is used for a create operation, and which is used for updates. Depending on the source, you may hear it both ways. However, the actual distinction between POST…

Details

Key commands for troubleshooting an IPsec VPN tunnel

If an IPsec VPN tunnel doesn’t work, a common cause is typos in the configuration. These could include errors in typing the shared secret, policy, IP address, or subnet. Hence, removing the tunnel from both ends and reconfiguring it often solves the problem. In some cases, however, you may need to do further troubleshooting, especially…

Details

Coming full circle with private clouds

One of the latest trends in IT management is “private clouds.” At first, the term may seem like an oxymoron, since the using “cloud” typically means using a remote public service to provide certain IT needs. However, many of the technologies that have been developed to power cloud computing can be used internally. These include…

Details

VMware and Microsoft are Working Together for the First Time Ever

In a move that has shocked many industry experts, VMware announced that it will be partnering up with longtime rival Microsoft for a new initiative named Project A2. This collaborative, divulged to the public during the annual conference VMworld, will be the first time the two software giants have ever worked together. Basically, Project A2 aims to…

Details

4 Reasons to Obtain Cisco Certification

The Value of Cisco Training and Certification Those currently in an IT career have seen their industry change rapidly over the past year, and the technology sector will likely continue to shift into 2016. While many companies are influencing the marketplace, perhaps none has as big of an impact as Cisco. Obtaining Cisco training is…

Details

9 Tips for Using Network Technology to Make Your Business More Efficient

Using Network Technology to Improve Your Business To keep pace in an increasingly competitive world, your business needs to run as efficiently as possible. “Sooner or later, any company not operating efficiently will be out of business,” says Laurie McCabe, vice president of small and medium business insights and solutions for research firm AMI-Partners. Efficiency…

Details

Ten Characteristics of a Highly Successful Network Administrator

What Are the Traits of an Effective Network Administrator? In order to provide the level of reliability that management has come to expect, network administrators need to continue to exhibit some of the same attributes that they have always exhibited (e.g., tenacity, attention to detail and responsiveness). Network administrators, however, also need to be adaptable…

Details

Certifications prepare women for tech jobs

There has been a lot of buzz in the news lately about the gender gap in technology careers. According to a study by the American Association of University Women, only 26 percent of computing jobs were held by women in 2013. Even well-known companies like Twitter need to improve their gender diversity, with Twitter sporting a…

Details

Cybersecurity training a must for IT professionals

Cybersecurity is becoming a top business priority as more companies transfer their data to the cloud, leverage the Internet of Things to optimize their operations and adopt bring-your-own-device policies. As a result, IT professionals will need to advance their knowledge in cybersecurity, especially within the realm of cloud computing.   In response to a greater…

Details

Hard and soft skills for IT jobs

Having the technical abilities required for a job is an important part of getting hired, but so is possessing valuable soft skills. The combination of a person’s hard and soft skills are often what gets them chosen over another qualified candidate. Being able to demonstrate relevant capabilities during an interview can help land a job,…

Details