
Happy Friday & Happy World Photography Day! Today encourages everyone around the globe to share a single photo that encapsulates their world. What photo would you share?
In This Issue: Awesome is Guaranteed | Cisco 3850 Two-Port 10G Ethernet Network Module | Best Practices for Data Center Security in 2022 | News to Start Your Day
The CK Daily – Awesome is Guaranteed
Here at CK we strive to ensure that your experience with us is next level and that the product you receive is greater than what you expected. Awesome is guaranteed at CK, but just so you know we aren’t joking around, here are some reviews directly from our customers:
“I was very impressed with everything. From the service when I ordered to the speedy delivery, and the great gifts and packaging. I will definitely be ordering from here again.”
“When I was desperate for a power module for my Cisco switch, I discovered C&K. Great website, great products, incredible customer service and I’d like to say that everything about my transaction was A+++. I have already purchased another product from them and look forward to continued purchases.”
“Great Service. Quick, on time, and great pricing.”
“Very happy with CablesAndKits, great prices and great service. Some of us old-fashioned businesspeople really appreciate that.”
Product Spotlights & Updates
The C3850-NM-2-10G network module offers a Gigabit Ethernet network connection via SFP or SFP+ connectors. Two slots on the left side of the module support only 1GB SFP Modules while the two slots on the right support either 1GB or 10GB SFP Modules. While there are 4 ports on the module, only 2 of them can be active at one time. If all ports are needed then the C3850-NM-4-10G will allow for 4 port connectivity.
Learning Center Article – Best Practices for Data Center Security in 2022
If you looked at data center security best practices only a few years ago, the leading trends and advice would be dramatically different from the leading areas of focus today. Everyone in IT knows that things change fast, but it feels like change has accelerated.
Here’s an example. Network security was the most important thing as recently as 2019. While it’s still paramount, security threats have shifted away from direct attacks. Social engineering and grid stability are actually more important today.
With all of that in mind, there are four up-to-date best practices that can help you think about how things have changed and what you can do to keep up.
Today’s News to Start Your Day:
- NASA will unveil potential future landing sites for a human return to the surface of the moon, and you can watch the briefing on Space.com today (Aug. 19), or directly on the space agency’s website. NASA is serious about getting humans back to the moon this decade and has already worked out the most convenient landing sites that will be targeted by the Artemis 3 mission in 2025.
- For 45 years, NASA’s twin probes Voyager 1 and Voyager 2 have been exploring our solar system and beyond as they currently roam through interstellar space. Despite its name Voyager 2 launched before Voyager 1, when it lifted off from Cape Canaveral Space Launch Complex 41 aboard a Titan IIIE-Centaur on Aug. 20, 1977. Voyager 1 followed suit about two weeks later on Sept. 5. While Voyager 1 primarily focused on Jupiter and Saturn, Voyager 2 visited both gas giants and then ventured on to Uranus and Neptune. But the duo didn’t stop there. Voyager 1 officially entered interstellar space on Aug. 25, 2012, while Voyager 2 entered on Nov. 5, 2018. The pair continue to journey through the cosmos and have enough power and fuel to keep scientific instruments running until at least 2025
- The CDC is investigating a “fast-moving” E. coli outbreak that was identified in Ohio and Michigan, with nearly 30 people infected by the bacteria from an unknown source.
- Apple has disclosed serious security vulnerabilities for iPhones, iPads and Macs, which could potentially allow attackers to take complete control of devices. Apple added that it is “aware of a report that this issue may have been actively exploited”.
