Rich Stroffolino looks at Apple’s commitments to both privacy and growing services revenue. His conclusion? The company should offer a VPN service.
Hot take alert: Facebook Protect isn’t the most insidious plot to steal your information.
Remember Linksys? The home office and SMB company that was the spearhead of Cisco’s move down market? Remember how they kind of disappeared once Cisco was finished with that play? Do you ever wonder what happened to them? Or where they are today? Or even if they still exist?
Eric Shanks of The IT Hollow comments: Mobility is no longer a challenge to traditional IT environments, it’s the standard. Users work from home to save office space, need to be connected during sales trips and are consistently not in the corporate office connected to the local area network (LAN). Combine this demand for a […]
Jason Edelman comments on his blog: I was driving home tonight and saw a tweet from Ethan Banks (@ecbanks) that stated, “After all these years of IPSEC (a standard, after all), bringing up a tunnel between disparate vendors is one of the hardest tasks I do.” When I see these kinds of statements and have […]
EMC Symmetrix BIN file, largely an unknown topic in the storage industry and practically there is no available information related to it. This post is just an attempt to shed some light as to what a BIN file is, how it works, whatâ€™s in it and why is it essential with the Enginuity code.
One of my projects involved the configuration of GRE (Generic Routing Encapsulation) tunnels, encrypted by IPSec, between two locations. I was having some problems getting the tunnels to work properly, but now I’ve managed to resolve that problem, and the configuration is working well. Here’s some additional information on the problem and how it was finally corrected.