article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

We’re not done yet, though – badges for physical access, PKI, USB keys, SmartCards, soft certs, biometrics, Network Access Control, firewalls, IPS/IDS, SIEM … I could go on and on. However, to use CAC with an Apple iPhone, you need to buy a sled – an iPhone case with integrated card reader. Userids and passwords are almost free.

Security 249
article thumbnail

Fountainhead: Profiling questions nobody's asking re: cloud.

Fountainhead

N Apps manipulating government data, e.g., where laws require direct data oversight Many government databases are required to be maintained within government facilities behind government firewalls. And most of all, curious to hear whether (and if so, which) service providers & consultancies are currently using guidelines such as these.

Cloud 186
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Build WebRTC Media Muscle

Spearline Testing

Users’ firewalls configuration and intentional or unintentional throttling of bandwidth. Apple exclusive. The following guidelines will help when tweaking frame-rates and resolutions: Content type. Users’ internet quality. Encourage users to turn off their automatic update processes. Quality of users’ hardware. Heavy on CPU.

Media 146
article thumbnail

Technology Short Take 145

Scott Lowe

Ivan Pepelnjak shares some links and thoughts on configuring the NSX-T firewall with a CI/CD pipeline built on GitHub Actions and Terraform Cloud. Howard Oakley of The Eclectic Light Company discusses some details on Apple’s M1 chip and what it does differently than other chips. Networking. Servers/Hardware.

article thumbnail

Technology Short Take 145

Scott Lowe

Ivan Pepelnjak shares some links and thoughts on configuring the NSX-T firewall with a CI/CD pipeline built on GitHub Actions and Terraform Cloud. Howard Oakley of The Eclectic Light Company discusses some details on Apple’s M1 chip and what it does differently than other chips. Networking. Servers/Hardware.

article thumbnail

Technology Short Take #57

Scott Lowe

Kirk Byers has a helpful article that provides some suggestions and guidelines for how to make your network automation/network scripts become more than just your own personal hobby at work. We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy.

Windows 60
article thumbnail

Build WebRTC Media Musical

Spearline Testing

Users’ firewalls configuration and intentional or unintentional throttling of bandwidth. Apple exclusive. The following guidelines will help when tweaking frame-rates and resolutions: Content type. Users’ internet quality. Encourage users to turn off their automatic update processes. Quality of users’ hardware. Heavy on CPU.

Media 15