System News
 1 2 3 4 5 6 7 8 9 10 11 next
Articles for the keywords: Monitoring
13 Apr 2014 New federal rule requires banks to fight DDoS attacks [35746]
Network World, April 4th, 2014

"Banks and financial institutions regulated by the federal government must now monitor for distributed denial-of-service (DDoS) attacks against their networks and have a plan in place to try and mitigate against such attacks," reports Ellen Messamer in Network World.

"In what is ground-breaking regulation for bank security, the Federal Financial Institutions Examination Council (FFIEC) issued a notice defining six steps it wanted banks and other financial institutions to follow, including first setting up a program to assess risk to IT systems, then monitoring Internet traffic to the institution's website to detect attacks, and being prepared to activate incident response plans with ISPs..."
(Get More Information . .) open to premium members only

07 Apr 2014 New IDS project spots anomalous system behavior [35796]
Help Net Security, April 10th, 2014

"A team of researchers from Binghamton University have been working on a new intrusion detection approach based on monitoring the behavior of systems and spotting when it differs from the one that is considered normal.

The project, titled 'Intrusion Detection Systems: Object Access Graphs' and funded by Air Force Office of Scientific Research, is conducted by doctoral students Patricia Moat and Zachary Birnbaum, research scientist Andrey Dolgikh, and they are mentored by Victor Skormin, professor of electrical and computer engineering..."
(Get More Information . .) open to premium members only

01 Jan 1970 Big Data Means Big Pipes [35649]
Network Computing, March 20th, 2014

"Crunching big data continues to challenge the industry to deliver faster and bigger solutions," comments Jim O'Reilly in Network Computing.

"Not only is data growing, but the advent of the Internet of Things and data-rich streams, such as those generated by retail store traffic pattern monitoring, are accelerating both the need to move data and the requirement to analyze it rapidly.

The IT industry is responding. For example, Intel has created a reference design for a memory-oriented system with 6TB of DRAM. This is aimed at extending the reach of in-memory databases, which are currently the leading edge of database performance."
(Get More Information . .) open to premium members only

06 Apr 2014 Top Ten Articles for last few Issues [35635]
Vol Issues 1, 2, 3 and 4; Vol 192 Issues 1, 2, 3 and 4

We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

  • 3D Printing: How Does it Really Work?
  • 12 Bluetooth Gadgets for Geeks
  • The Dirty Little Secret of Talent Sourcing No One Ever Talks About
  • A Futurist on Why Lawyers Will Start Becoming Obsolete This Year
  • Science vs. Fiction: 15 Sci-Fi Technologies That are (Almost) Here
  • How CIOs Can Make IT Workplaces More Productive: 11 Best Practices
  • 3D Printing: 10 Companies Using it in Ground-Breaking Ways
  • Step Up To Digital Leadership
  • Why CIOs Need To Think About The Internet Of Things
  • What is 3D printing?

The longer version of this article has list of top ten articles for the last 8 weeks.
(Get More Information . .) open to premium members only

04 Apr 2014 New federal rule requires banks to fight DDoS attacks [35676]
Network World, April 4th, 2014

"Banks and financial institutions regulated by the federal government must now monitor for distributed denial-of-service (DDoS) attacks against their networks and have a plan in place to try and mitigate against such attacks, a federal regulatory body said this week.

In what is ground-breaking regulation for bank security, the Federal Financial Institutions Examination Council (FFIEC) issued a notice defining six steps it wanted banks and other financial institutions to follow, including first setting up a program to assess risk to IT systems, then monitoring Internet traffic to the institution's website to detect attacks, and being prepared to activate incident response plans with ISPs..."
(Get More Information . .) open to premium members only

 
 1 2 3 4 5 6 7 8 9 10 11 next






News and Solutions for Users of Solaris, Java and Oracle's Sun hardware products
Just the news you need, none of what you don't – 42,000+ Members – 24,000+ Articles Published since 1998

!-- end archive_section.tpl -->