Highly skilled with over 20 years experience in design, implementation and administration of multi-vendor, multi-protocol systems and networks. Results-driven with a solid understanding of network technologies and communication protocols, having worked in a variety of environments including ISPs, health organisations, educational institutes and SMEs – imperative to resolving complex problems; assessing the use of current technologies, planning the evolution of network systems/infrastructure to achieve technology optimisation, objectives and goals.
Commonalities with my name:
Shane Singh, Shaineel Singh, Shaine Singh, Shane Sing
Attributes:
• High level of initiative, self driven and results-oriented.
• Positive attitude to adapt in a fast-changing environment.
• Ability to perform under pressure.
• Maintains high professional standards.
• Customer orientation.
• Good oral, written and interpersonal skills
• Analytical and innovative
• Ability to work effectively in a team
Specialties:
• IP network design (Cisco/Juniper).
• UNIX (Solaris/HP-UX) and Linux (CentOS, Redhat, Slackware, Ubuntu)/FreeBSD administration.
• Storage/Backup (NetApp/Brocade/HP Data Protector/CommVault) administration.
• Firewall/Loadbalancer design (Checkpoint/Nokia/Juniper/F5/Alteons)
• Operational knowledge of IP Routing protocols, LAN technologies and network security framework/methodologies.
• Ability to undertake network and host-based security/risk assessments.
• Experience with open source tools.
* Cloud
* SDN/NFV
* Security
* Telco/Service Provider
If you’re looking for a nice dose of crypto conspiracy theorizing and want to read a paper by some very knowledgeable cryptographers, I have just the paper for you. Titled “A Riddle Wrapped in an Enigma” by Neal Koblitz and Alfred J. Menezes, it tackles one of the great mysteries of the year 2015. Namely: why did the NSA just freak out and throw its Suite B program down the toilet?
Haste and anger are … the two greatest obstacles to wise counsel … the question is not so much whether they are guilty as whether we are making the right decision for ourselves … For those who make wise decisions are more formidable to their enemies than those who rush madly into strong action.
A while back, I was on a philosophy debate binge. Watching Sam Harris and the late Christopher Hitchens annihilate their opponents with precision and wit is my idea of a good night in, and YouTube’s “related videos” are a deep, dark rabbithole.
“We are all of us resigned to death: it’s life we aren’t resigned to,” novelist Graham Greene once wrote.
Covering the period from the late 1800s to the stock market collapse of 1929, The Lords of Creation traces the consolidation of economic power in the hands of the Rockefellers, Morgans and Vanderbilts, who were able to make the economy work for them as opposed to lower class Americans. A new introduction by Gretchen Morgenson, financial reporter for the New York Times, explains the continuities between the heyday of those “robber barons” and the great financial crimes of recent years.
Too many programmers don’t pay enough attention to the fonts they use to work, yet coding involves staring at your screen a long and reading complicated and detailed text.
There are lots of great metal bands, but a lot of our old favorites fail to really evolve and after decades of rockin’ to Slayer, Megadeth, Pantera, etc, you just need something new, something more evolved, and complex. A critical element of metal is that its stimulating, not just aggressive, and some of the old stand by bands are just too familiar.
If you’re scared of heights, then you might not want to look down from these spots. From sky-high skywalks and observation decks to majestic mountain peaks, these amazing attractions from around the world offer stomach-churning, vertigo-inducing views.
The rules are simple: being merely eccentric while swathed in outlandish clothing fails to qualify. Having done an epic amount of street powder while getting handjobs in the groupie van is not enough. Hell, Steven Tyler claims to have spent $3 million on cocaine over the years, but would Aerosmith have sounded one iota different if they’d been straight edge? It’s the same reason Mötley Crüe doesn’t warrant space on this list. Sure, they snorted live ants (actually, that was Ozzy) and mainlined Jack Daniel’s to stave off epic boredom, but their music would have been exactly the same steaming pile of hair regardless.
From 1983 to 1993 DARPA spent over $1 billion on a program called the Strategic Computing Initiative. The agency’s goal was to push the boundaries of computers, artificial intelligence, and robotics to build something that, in hindsight, looks strikingly similar to the dystopian future of the Terminator movies. They wanted to build Skynet.
Indeed, the very phrase “citizen journalist” strikes my ear as Orwellian. A neighbor who is a good listener and cares about people is a good neighbor; he is not in any sense a citizen social worker, just as a neighbor with a garden hose and good intentions is not a citizen firefighter. To say so is a heedless insult to trained social workers and firefighters.
I am not so blind that I cannot see the shadow of the axe when it is hanging over my own neck. – Robert Baratheon to Ned Stark (Game of Thrones Chapter 33) Ned Stark baulked at the idea of assassinating a pregnant young girl. But then it was Ned’s political naivete coupled with his sense of honour that brought about his downfall.
Speculative fiction is the literature of change and discovery. But every now and then, a book comes along that changes the rules of science fiction and fantasy for everybody. Certain great books inspire scores of authors to create something new. Here are 21 of the most influential science fiction and fantasy books.
He used to tell me with perfect gravity that politically he was “a left conservative,” and this quixotic description has a patina of truth to it. Probably more than anything, Mailer was a libertarian and a foe of any system or mind-set that involved the censorious (feminism) or the overweening and the grandiose (imperialism/communism)
Most computers today are fitted with Trusted Platform Module. This is a secure co-processor mounted on the motherboard. The specification of TPMs are published, and an industry body certifies compliance with those specifications. To the extent that the spec is good (and the industry body is diligent), it’s possible to be reasonably certain that you’ve got a real, functional, TPM in your computer that faithfully implements the spec.
Don’t think, by the way, that a thing like Bitcoin can’t be co-opted by governments. A global public ledger is a very good system for everyone seeing if taxes are being paid or not. The network could literally reject transactions that don’t include a tax declaration, and directly pay to a bitcoin account controlled by taxation services. Everything can be subverted.
Though known as a straight-shooter when it comes to interpreting the law, Pillard, a Georgetown law professor, is married to prominent NSA critic and academic David Cole
People are saying I don’t need anything but my own ability to earn a profit. I’m not connected to society.
The idea for my documentary, Letter to Nelson Mandela, first occurred in 2011 in San Sebastian, Spain.
write down a command-line to see the help text that matches each argument
(support for control flows (if/while/etc.) and command substitutions will be added later on)
“There seems to be strong consensus to increase the use of encryption on the Web, but there is less agreement about how to go about this,” Mark Nottingham, chair of the HTTPbis working group, wrote in Wednesday’s letter. (HTTPbis roughly translates to “HTTP again.”)
In this article I’d like to illustrate some of the implications of this change with respect to the IPv6 treatment of packet fragmentation by taking an in-depth look at the IPv6 packet flows and why and how this change to packet fragmentation management can cause service-level disruption
I once happened to visit Google’s offices in Victoria, where there’s a live stream of people’s queries on a huge flat screen. Most of them were in Japanese. My host, who speaks Japanese, glanced at them and looked at her watch. “Recipes,” she said. “It’s 7pm in Japan, people have just got in from work and are thinking about what to cook.”
On the morning of Thursday, July 12, 2012, Yahoo’s interim CEO, Ross Levinsohn, still believed he was going to be named permanent CEO of the company. He had just one meeting to go. That…
To put that in context, the iPhone 5S beats my 2008 15-inch MacBook Pro by a small measure in the Sunspider benchmark (with the MacBook Pro running the latest Safari 6.1 beta). The iPhone 5S is, in some measures, computationally superior to the top-of-the-line MacBook Pro from just five years ago. In your fucking pocket.
Through the foundation, Bill, Melinda and Microsoft maintain pharmaceutical patent investments, tobacco investments, investments in alcoholic beverages, petroleum investments, investments in experimental and controversial crops, and even investments in news/media. Gates need not even pay tax, though he keeps control of the assets and uses that control to influence private and public policy.
As security practitioners, we care about which vulnerabilities matter. Much like looking at a dictionary doesn’t tell you anything about how often people use a common word such as “the,” a vulnerability database tells one nothing about which vulnerability trends matter.
Many networking engineers and researchers express the opinion that 100 milliseconds latency is “good enough”. If the Internet’s worst latency (under load) was 100ms today, indeed, we’d be much better off than we are today (and would have space warp technology as well!). But the speed of light and human factors research easily demonstrate this opinion is badly flawed.
From this gloomier perspective,” the new paper says, “it is reassuring to see that our findings show that people are in fact only four worlds apart, and not five.
Some critics see high rise living in the CBD as ‘vertical sprawl’, but its sustainability credentials are exemplary, it’s eminently walkable and it helps make housing affordable elsewhere in the metro area…
Not all stateful inspection firewalls are equal. Some handle packets slightly differently than others. For example some (like Checkpoint, Netscreen and others) let non-SYN packets to permit rules generate new state table entries. Some (Cisco, Netfilter and others) will only generate a state table with proper session establishment (must see TCP three packet handshake).
The federal power to wiretap, a central issue during the Bush years, has made a comeback.
When questioned at a press conference as to whether she saw any meaning in this slump, Ms Gillard responded: “Fuck them. Fuck the lot of them. They deserve Abbott, those fucking hyper-critical sheep. I mean seriously, he hasn’t even got a platform to run on; all he’s done is criticise every single fucking move we make and then failed to meet us halfway when we try to actually govern the country for you fuckwits. I give up. Enjoy your dial-up internet and corporate overlords. I’m moving to New Zealand.” Gillard’s press team later issued a correction to this statement, clarifying Ms Gillard had actually mean to say, “No”.
If you are a senior (read over 30) IT technical person, well versed, even expert, in your chosen products and technologies, how secure is your career?
“Give me six hours to chop down a tree and I will spend the first four sharpening the axe.”
Abraham Lincoln
I am still learning how exactly to use this medium to write, let alone the intricacies of Squarespace.
The lack of content for a while is not indicative of an absence of posts to publish, rather a “getting to know one’s surrounds”.
Thanks.