About bmoran

This author has not yet filled in any details.
So far bmoran has created 403 blog entries.

Ship cyber security guidelines launched

As vessels at sea become better linked via broadband satellite and other connections, the risk of ship cyber security issues increases. To increase awareness of these risks, the global shipping community released guidelines for avoiding potential cyber vulnerabilities that could potentially drive major safety, environmental and commercial incidents. The guidelines were released by BIMCO, the largest international shipping association, and [...]

Top Uplogix Blog Articles of 2015

As a platform for network automation, Uplogix touches on many areas of networking, leading the Uplogix blog to hit on many topics throughout the year. A quick analysis of which articles had the most hits showed some of the favorites from this year. They tended to break into categories like security, our product, our staff [...]

Everything as a service

IT departments today find themselves pinned between meeting expectations of business units based on managed service provider promises and a wealth of new technology options. Oh, and no pressure -- business revenue is increasingly dependent on IT getting it right. Enterprise IT has traditionally been regarded as quite different from the Managed Service Provider model. As more and more technology is moving to the [...]

Ready to add 60+ devices/second to the Internet-of-Things?

So what does a 30% increase in Internet-connected devices in one year look like? Try 5.5 million new devices added every day. Gartner says the one of the big winners in this expanding market will be Internet-of-Things services like design, installation and operating contacts. Consumers will deploy most IoT devices, but businesses will account for [...]

Cybersecurity threats in 2016

December is a great time to look back on the year and look forward to what to expect in the new year. The McAfee Labs security team released their annual report about the cybersecurity threats to expect in the next five years. Unfortunately the news is that if you thought ransomware, data breaches and hacked Jeeps were [...]

The key to enterprise out-of-band is flexibility

When planning an out-of-band management solution, it's best to consider your options for the out-of-band connection including what's already available onsite and how much bandwidth is needed. A flexible out-of-band solution like Uplogix will be able to work with a wide variety of connection options including dial-up, cellular, fiber and satellite modems. A secondary Ethernet connection [...]

Security automation parallels network automation

An increasing number of security tools are providing automation capabilities to reduce the burden on security specialists when it comes to intrusion prevention, network access control, endpoint security and mobile device management. But to a large degree, these features sit unused. Legitimate worries about blocking business traffic accidentally and keeping business from operating as it [...]

Overtime is most of the time for IT

Working long hours in IT jobs isn't anything new, but a recent survey by Spiceworks has quantified who has things the roughest. For full-time IT staff, the survey's 600 respondents averaged working 52 hours a week. Broken out, that's 18-percent worked 60+ hours a week, 17-percent were 50-59 hours, 22-percent were 41-49 hours, and 44-percent [...]

Mean Time to Innocence gains trust

The earliest reference to the term "Mean Time to Innocence" in a Google search was in 2007 on the Professor Messer training site. By 2012, there were about 50 search results. While definitely not  a scientific study, over the last two years, over 100 new online mentions of this term appear as it gains popularity with [...]

Your sleeping army for network automation

There is a good chance that your network has a sleeping army of undead devices out there just waiting to be commanded into action. Not zombies, but console servers. Used for years for remote access to devices connected by some form of out-of-band link, these unassuming devices sit quietly doing nothing at all until finally [...]