Invariably, things change. Profound I know, but even in the world of the venerable IRIG timecode there is a new search engine contender, iRig. Granted, a new guitar interface adapter for your smart phone app is a far cry from a waveform used to synchronize instrumentation, but even in IRIG there are revolutionary changes happening. Read more »
I think we would agree the publishing of Common Vulnerabilities and Exposures (CVEs) is a very useful mechanism to collectively evolve and harden our networks and products. It starts the timer, if you will, on a race between the black hats and organizations to respectively exploit or neutralize the CVE. Read more »
Over the past weeks, I’ve written about the negative consequences of running out-of-sync computers in a network. The dangers are many and include: Read more »
In the second part of “providing good network time,” this article will go into more detail on redundant time sources, reliable time synchronization, secure time source, ease-of-use, and cost efficiency. Read more »
Keeping accurate time on a network is more than just a technical issue—it is also a legal one. That’s because time is used as a basis for making contracts. Read more »
How organizations keep track of time has a major impact on the overall security of the organization’s IT infrastructure, for two reasons. First, the mechanisms used to keep track of time are among the most vulnerable to exploitation by a hacker. Read more »
In the first post of this series, we wrote about how most organizations today rely on networks of computers, all of which rely on clocks. If the clocks in these computers don’t agree with each other or reflect the correct time, it’s a bomb ticking away in the heart of IT infrastructure. Read more »
In the first post of this series, we wrote about how most organizations today rely on networks of computers, all of which rely on clocks. If the clocks in these computers don’t agree with each other or reflect the correct time, it’s a bomb ticking away Read more »