Marrying the Business Need With Technology, Part 3: Re-aggregating the Tools

In part one of this blog series we discussed how there is oftentimes a lack of knowledge when it comes to infrastructure technology and knowhow in the relevant DevOps teams. This is not what was intended when “Agile” moved from being a pur… Continue reading Marrying the Business Need With Technology, Part 3: Re-aggregating the Tools

Application Delivery and Application Security Should be Combined

Most businesses have multi-function printers that can fax, scan, and copy.  In our roles, we are multi-functional as well.  A network architect is often the operational troubleshooter because of his/her knowledge and expertise.  The fin… Continue reading Application Delivery and Application Security Should be Combined

When is a 10-bit A/D an 8-bit A/D?

Marketing guys love bigger numbers. Bigger is better, right? After all, Subway called it a “footlong” not an 11-incher. So when it comes to analog to digital (A/D) conversion, more bits are better, right? Well, that depends. It is easy to understand that an A/D will have a low and high measurement and the low will be zero counts and the high will result in the maximum count for the number of bits. That is, an 8-bit device will top out at 255, a 10-bit at 1023, and so on.

The question is: are those bits meaningful? The answer depends …read more

Continue reading When is a 10-bit A/D an 8-bit A/D?

Old Technologies Enable Future Secure Application Delivery Networking

Many years ago, one of my customers had an internet-facing application. They positioned load balancers in front of the application to support the growing traffic load. Traffic to the website was growing so fast, that parts of the network infrastructure could not support the customer load. One of the first components to fail under the […]

The post Old Technologies Enable Future Secure Application Delivery Networking appeared first on Radware Blog.

The post Old Technologies Enable Future Secure Application Delivery Networking appeared first on Security Boulevard.

Continue reading Old Technologies Enable Future Secure Application Delivery Networking

Hackaday Prize Entry: Dynamometer for Post Stroke Rehabilitation

For those who have suffered a stroke, recovery is a long and slow process that requires rehabilitation to start as early as possible. Quite often, secondary stroke attacks complicate matters. Spasticity — muscle contraction and paresis — muscular weakness, are two of the many common after-effects of stroke. Recovery involves doing repeated exercises to strengthen the muscles and bring back muscle memory. Benchmarking progress becomes difficult when caregivers are only able to use qualitative means such as squeezing tennis balls to monitor improvement. To help provide quantitative measurements in such cases, [Sergei V. Bogdanov] is building a Dynamometer for Post-Stroke …read more

Continue reading Hackaday Prize Entry: Dynamometer for Post Stroke Rehabilitation

8-Channel ADC For the Raspberry Pi

The Raspberry Pi is a powerful embedded computing platform. However, for all its Linux-based muscle, it lacks one thing that even the simplest 8-bit microcontrollers usually have – analog-to-digital conversion. There are a great many ways to rectify this shortcoming, and [Chris Burgess] has brought us another – with an 8-channel ADC for the Raspberry Pi.

For the ADC, [Chris] chose the MCP3008, for its low cost and availability. In this configuration it offers 10-bit resolution and a maximum sampling rate of 200 kilosamples per second. Adafruit has a great guide on working with the MCP3008, too. With such a …read more

Continue reading 8-Channel ADC For the Raspberry Pi

Outbound SSL Solutions Protect Assets in the Wild

Businesses need to protect their assets when they are within their protective infrastructure AND when they are actively exposed or placed within the unprotected external world. The tools and procedures needed to protect the internal assets are different from the ones that protect the assets when they leave the confines of the secured network. Walls […]

The post Outbound SSL Solutions Protect Assets in the Wild appeared first on Radware Blog.

Continue reading Outbound SSL Solutions Protect Assets in the Wild

The ADC Key Master Delegates Application Security Functions

One of the responsibilities of the Key Master is to provide access to the sensitive and secure information hidden within the locked facilities.  In my last post, I explained why the application delivery controller (ADC) is the Key Master for SSL/TLS communications on the internet.  It is the responsibility of the ADC to manage and […]

The post The ADC Key Master Delegates Application Security Functions appeared first on Radware Blog.

Continue reading The ADC Key Master Delegates Application Security Functions

The ADC is the Key Master for All Things SSL/TLS

In the movies (and real life) one often needs to go through the Key Master to get to the destination. The job of the Key Master is to keep control of the access to the locks and barriers that protect important or sensitive material. Sometimes there is one key to get to the hidden rewards […]

The post The ADC is the Key Master for All Things SSL/TLS appeared first on Radware Blog.

Continue reading The ADC is the Key Master for All Things SSL/TLS