Friends of Myriad – It is with great excitement that we announce our partnership with the nonprofit organization Girl Develop It! GDI’s mission is to help teach women around the globe how to code and develop software, thus empowering more women to enter the tech field. With only 25% of computer related jobs in the… Read more »
Category: News
The Great WiFi Migration
Cloud this, virtual that… it’s the future, and mostly it’s a good thing! Welcome to the great WiFi expansion, folks! The Past Not too long ago, when people started deploying multiple wireless access points (APs) in a single location, they realized how cumbersome it was to manage all APs individually. The masses demanded a way of… Read more »
BYOD: Is it Worth the Risk?
The Bring Your Own Device (BYOD) phenomenon has become a highly debated topic in many organizations. While some enterprises are fully enveloped in the BYOD trend, others are hesitant to adopt this new strategy because of the numerous risks associated with it. Regardless, here is what you need to know to be BYOD-ready.
Jibba Jabba or the Nines Nines Nines
You’ve probably heard “nines” thrown around when talking high availability, so let’s review them to make everyone talk the same talk or IT Jibba-Jabba.
High Severity GnuTLS bug
On May 23rd, Nikos Mavrogiannopoulo (one of the primary authors of the GnuTLS library) submitted a commit identifying the potential for “memory corruption” during the TLS/SSL handshake process. This specific bug makes it possible to initiate a server-based attack on a client system by corrupting its memory using a specially crafted ServerHello message.
Heartbleed: A Case For Two-Factor Authentication
By now you’ve probably heard about a major vulnerability in the OpenSSL Project’s implementation of SSL known as Heartbleed. If you’re not familiar with SSL, it is a protocol designed to secure communication between an end-user (client) and application (server) using cryptography and keys intended to make it difficult to intercept and read protected traffic…. Read more »
DDoS Ammunition: Are you protected?
Saar here, resident engineer at Myriad Supply. Today I’ll be discussing DDoS ammunition. The FFIEC gives “recommendations” to banking institutions. This is a non-binding recommendation, and there is no law per say that says you must have DDoS protection. However, if someone suffers financial damages due to a DDoS attack on a bank, that person… Read more »
Breaking news: Ruckus Will Be Joining The Cloud!
That’s right people, the Controller based wireless giant is working on a cloud offering similar to Aerohive, Aruba and Meraki. For now, it is still too early to tell what we are exactly in for. Ruckus is keeping their cards close. As a matter of fact, the whole Ruckus Cloud offering subject is very hush… Read more »
Controller, Cloud Managed and Standalone WiFi Deployments, Oh My!
Hello all, the speaking. In the WiFi world, there are three major types of wireless deployments. These are, as the title says, Controller Based, Cloud Managed, and Standalone; They are all different, and each one has its correct application, benefits, and vices. It has come to my attention that the differences among these groups… Read more »
Myriad Gear Powers the Big Game
This year when you sit down to watch the Big Game, part of what you see, hear and read will be supported by technology provided by Myriad Supply. Many of the phones, ticket scanning devices, VOD equipment and computers that will make this event possible will get an internet connection from routing and switching technology… Read more »
Recent Comments