Remove 2016 Remove Firewall Remove Hardware Remove Security
article thumbnail

Google, Facebook, and Twitter halt government data requests after new Hong Kong security law

The Verge

Google, Facebook, and Twitter are pausing the processing of data requests from the Hong Kong government as they review a new security law that went into effect on July 1st. The new policies are in response to China’s new national security law in Hong Kong, which was first proposed in May. Illustration by Alex Castro / The Verge.

article thumbnail

Lenovo patches two high severity flaws in PC support tool

Network World

Lenovo Solution Center (LSC) allows users to check their system's virus and firewall status, update their Lenovo software, perform backups, check battery health, get registration and warranty information and run hardware tests.

Tools 61
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #77

Scott Lowe

In a bit of an older post from late summer 2016, Matt Oswalt outlines why network engineers should care about the network software supply chain. Servers/Hardware. Jeff Geerling has a great article on why he returned his 2016 MacBook Pro with Touch Bar ; it’s definitely worth a read, in my opinion.

Linux 60
article thumbnail

Technology Short Take #66

Scott Lowe

I recently spoke at Interop 2016 in Las Vegas, and while I was there I scribbled down some notes pertaining to how decomposing applications into microservices-based architectures was similar in some respects to decomposing networks into an overlay network and an underlay (physical) network. Servers/Hardware. Networking.

Vmware 60
article thumbnail

Technology Short Take #63

Scott Lowe

At DevOps Networking Forum 2016, I had the opportunity to share a presentation on some Linux networking options. Servers/Hardware. Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. Have fun reading! Networking. Read more about it here.

Vmware 60
article thumbnail

ATMs Are IT Too!

Cloud Musings

“These more sophisticated systems, requiring updates, patches, and support in real-time, along with software and hardware that can operate nimbly in an agnostic ecosystem. Security challenges, the second key trend, are also morphing daily as threats become more and more diverse. Jackson 2016 ) Follow me at [link].

IBM 87
article thumbnail

Technology Short Take #57

Scott Lowe

Servers/Hardware. We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy. This article provides a good introductory overview of Linux iptables commands for configuring host-based firewall rules on your Linux systems.

Windows 60