<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Break</title> <atom:link href="https://www.iphere.com/tag/break/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>SDN Helps Break Down Barriers To Scaling</title><link>https://www.iphere.com/sdn-helps-break-down-barriers-to-scaling</link> <comments>https://www.iphere.com/sdn-helps-break-down-barriers-to-scaling#comments</comments> <pubDate>Fri, 22 Nov 2013 20:13:21 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Barriers]]></category> <category><![CDATA[Break]]></category> <category><![CDATA[Down]]></category> <category><![CDATA[Helps]]></category> <category><![CDATA[Scaling]]></category> <guid
isPermaLink="false">http://www.iphere.com/sdn-helps-break-down-barriers-to-scaling</guid> <description><![CDATA[Vendors are using software to handle complex operations and overcome obstacles to scaling in networking and storage. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/sdn-helps-break-down-barriers-to-scaling/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Survey: younger employees break the rules and put your company at risk</title><link>https://www.iphere.com/survey-younger-employees-break-the-rules-and-put-your-company-at-risk</link> <comments>https://www.iphere.com/survey-younger-employees-break-the-rules-and-put-your-company-at-risk#comments</comments> <pubDate>Wed, 30 Oct 2013 14:13:23 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Break]]></category> <category><![CDATA[Company]]></category> <category><![CDATA[Employees]]></category> <category><![CDATA[Risk]]></category> <category><![CDATA[Rules]]></category> <category><![CDATA[Survey]]></category> <category><![CDATA[younger]]></category> <guid
isPermaLink="false">http://www.iphere.com/survey-younger-employees-break-the-rules-and-put-your-company-at-risk</guid> <description><![CDATA[Despite the freewheeling autononmy implied by the &#8220;bring your own device&#8221; movement, companies that embrace the consumerization of IT still have policies in place to govern the management and security of those devices. According to a new survey from Fortinet, though, a majority of younger employees are more than willing to ignore those policies if they [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/survey-younger-employees-break-the-rules-and-put-your-company-at-risk/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Good Technology helps businesses break the BlackBerry habit</title><link>https://www.iphere.com/good-technology-helps-businesses-break-the-blackberry-habit</link> <comments>https://www.iphere.com/good-technology-helps-businesses-break-the-blackberry-habit#comments</comments> <pubDate>Sat, 26 Oct 2013 20:15:06 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[BlackBerry]]></category> <category><![CDATA[Break]]></category> <category><![CDATA[Businesses]]></category> <category><![CDATA[Good]]></category> <category><![CDATA[habit]]></category> <category><![CDATA[Helps]]></category> <category><![CDATA[Technology]]></category> <guid
isPermaLink="false">http://www.iphere.com/good-technology-helps-businesses-break-the-blackberry-habit</guid> <description><![CDATA[BlackBerry has been in a death spiral, and it’s immediate future is a mystery. That is cause for concern for companies that rely on BlackBerry, and has forced businesses to start considering an exit strategy. But the real challenge is finding an alternate platform that doesn’t compromise on security. Good Technology thinks it has the [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/good-technology-helps-businesses-break-the-blackberry-habit/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>9 Technologies Security Researchers Will Break At Black Hat</title><link>https://www.iphere.com/9-technologies-security-researchers-will-break-at-black-hat</link> <comments>https://www.iphere.com/9-technologies-security-researchers-will-break-at-black-hat#comments</comments> <pubDate>Tue, 30 Jul 2013 02:12:55 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Black]]></category> <category><![CDATA[Break]]></category> <category><![CDATA[Researchers]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Technologies]]></category> <guid
isPermaLink="false">http://www.iphere.com/9-technologies-security-researchers-will-break-at-black-hat</guid> <description><![CDATA[This week&#8217;s Black Hat USA Conference in Las Vegas will showcase hacks, tools and ideas that will once again challenge the way we think about IT security. Here are nine technologies that will be on the firing line as security researchers discuss and demonstrate vulnerabilities and exploits. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/9-technologies-security-researchers-will-break-at-black-hat/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>To Break The IT Bottleneck, Stop Covering Your You-Know-What</title><link>https://www.iphere.com/to-break-the-it-bottleneck-stop-covering-your-you-know-what</link> <comments>https://www.iphere.com/to-break-the-it-bottleneck-stop-covering-your-you-know-what#comments</comments> <pubDate>Thu, 11 Jul 2013 14:13:39 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Bottleneck]]></category> <category><![CDATA[Break]]></category> <category><![CDATA[Covering]]></category> <category><![CDATA[Stop]]></category> <category><![CDATA[YouKnowWhat]]></category> <guid
isPermaLink="false">http://www.iphere.com/to-break-the-it-bottleneck-stop-covering-your-you-know-what</guid> <description><![CDATA[Fifteen signatures. That&#8217;s how many approvals were required to make a single change on a production firewall at the global transportation company where I was a technical architect. Fifteen separate approvals, all captured on paper and ultimately dropped into a file cabinet somewhere, likely never to be seen again. The process was long, painful and, [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/to-break-the-it-bottleneck-stop-covering-your-you-know-what/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>