Archive

Category Archives for "Networking"

Google’s Pixel phones: 7 essential technical upgrades we want to see

Google will, if the persistent rumors are true, forego releasing “Nexus” phones this year in favor of a pair of phones under the “Pixel” banner. Is this just a re-branding, or are there material differences between the two product lineages?Well, the Nexus heritage is based on affordable hardware that runs stock Android—phones that have always been aimed at developers and enthusiasts. The Pixel brand, whether it’s the Chromebook Pixel or the Pixel C Android tablet, is more aspirational. The Pixel hardware is higher-priced and higher-quality, and brings unique features to bear. Beyond that, the Pixel devices not only compete with high-end hardware from other manufacturers, but also point the way forward for those companies. They show “what can be done” if you pull out all the stops.To read this article in full or to leave a comment, please click here

How blind skills challenges can close the skills gap

Jessica Janiuk didn't set out to have a career in IT. After earning a degree in communications with a minor in web development, Janiuk started working as a video producer, but quickly found that wasn't the right fit. When offered the opportunity to work on software, Janiuk jumped at the chance, found a professional calling and has thrived in the IT industry for the last few years. But as a trans-woman, Janiuk has experienced more than the usual biases women in tech are subjected to on the journey to her current position as a front-end software engineer for global data protection firm Datto.Though Silicon Valley firms and more progressive, organizations globally are employing a number of methods to increase diversity in their talent pipelines and remove biases in their recruiting and hiring processes, it's still an uphill battle for women, the LGBTQ community and other underrepresented minorities trying to break into the IT field. One way to ensure bias isn't impacting the hiring process is through blind coding challenges to screen and qualify technical talent.To read this article in full or to leave a comment, please click here

Cisco moves on from Intercloud, will focus on cloud management instead

Cisco this week released new software and services for helping organizations migrate to cloud-based infrastructure, whether it be infrastructure they run themselves or resources from public cloud providers.+More on Network World: Cisco CEO: Spin-in technologies aren’t dead at Cisco+But as part of this effort Cisco is not pointing customers to one of its own public cloud platforms as it has wound down and pivoted away from its multi-year effort to develop its once-heralded Intercloud.To read this article in full or to leave a comment, please click here

This Is Why I’m Not Doing SD-WAN Webinars

One of my long-time regular readers sent me this question:

I was wondering if you have had any interest in putting together an SD-WAN overview/update similar to what you do with data center fabrics where you cover the different product offerings, differentiators, solution scorecard…

That would be a good idea. Unfortunately the SD-WAN vendors aren’t exactly helping.

Read more ...

Cisco CEO Robbins: Wait til you see what’s in our innovation pipeline

It’s been a little over a year since Chuck Robbins took the reins at Cisco from the venerated John Chambers. In that time, the face and pace of the IT realm has transformed -- from Dell buying EMC and HP splitting up to the swift rise of IoT and harsh impact of security challenges. Robbins has embraced this rapid change and, he says in this wide-ranging interview, moved the company forward with relentless speed to address everything from hyperconvergence to application-centric infrastructures. To read this article in full or to leave a comment, please click here(Insider Story)

Cisco CEO Robbins: Wait til you see what’s in our innovation pipeline

It’s been a little over a year since Chuck Robbins took the reins at Cisco from the venerated John Chambers. In that time, the face and pace of the IT realm has transformed -- from Dell buying EMC and HP splitting up to the swift rise of IoT and harsh impact of security challenges. Robbins has embraced this rapid change and, he says in this wide-ranging interview, moved the company forward with relentless speed to address everything from hyperconvergence to application-centric infrastructures. To read this article in full or to leave a comment, please click here(Insider Story)

Industry First Micro-segmentation Cybersecurity Benchmark Released

microsegmentationThe VMware NSX Micro-segmentation Cybersecurity Benchmark report has been released! As previewed in part six of the Micro-segmentation Defined – NSX Securing Anywhere blog series , independent cyber risk management advisor and assessor Coalfire was sponsored by VMware to create an industry first Micro-segmentation Cybersecurity Benchmark report. Coalfire conducted an audit of the VMware NSX micro-segmentation capabilities to develop this benchmark report detailing the efficacy of NSX as a security platform through a detailed “micro-audit” process, testing NSX against simulated zero-day threats.

Testing included five different network design patterns, and demonstrated how NSX micro-segmentation can provide stateful, distributed,  policy-based protection in environments regardless of network topology. Topologies included –

  • Flat L2 network segments
  • L2 and L3 networks with centralized virtual or physical routers, representative of typical data center rack implementations built on hybrid physical and network virtualization platform / distributed virtual switch (dVS)
  • Networks with connection to other physical servers
  • Overlay-based networks using the Distributed Firewalls (DFW) and Distributed Logical Routers (DLR)
  • Physical VLAN and overlay-based networks using service insertion technologies running on dedicated VMs (in our case, Palo Alto Networks NextGen FW with Panorama)

five-micro-seg-design-patterns

Coalfire’s examination and testing of VMware NSX technology utilized simulated exploits that depict likely malware and Continue reading

Russia has previously tried to influence US elections, says spy chief

Russia has tried to influence U.S. elections since the 1960s during the Cold War, U.S. Director of National Intelligence James R. Clapper said Tuesday.It's not clear whether the interference, which has a long history, aims to influence the outcome of the election or tries to sow seeds of doubt about the sanctity of the process, Clapper said in an interview to The Washington Post.The remarks are the closest the U.S. spy chief has come to suggesting that Russia could be involved in recent hacks of Democratic party organizations.To read this article in full or to leave a comment, please click here

Russia has previously tried to influence US elections, says spy chief

Russia has tried to influence U.S. elections since the 1960s during the Cold War, U.S. Director of National Intelligence James R. Clapper said Tuesday. It's not clear whether the interference, which has a long history, aims to influence the outcome of the election or tries to sow seeds of doubt about the sanctity of the process, Clapper said in an interview to The Washington Post. The remarks are the closest the U.S. spy chief has come to suggesting that Russia could be involved in recent hacks of Democratic party organizations.To read this article in full or to leave a comment, please click here

WAN Impairment/WAN Emulator with WAN Bridge

Playing in the lab and want to impair a link with delay or loss?  ?    I use WAN Bridge – its simple and free.

impairment

So say I’m testing an SD-WAN brownout/impairment avoidance solution in my lab.  For example, Cisco’s IWAN.  I’m going to need something to impair links with delay or loss.  I like WAN Bridge.  Why?  Because its simple, easy, and free.

There has been one thing I’ve struggled with in the past year about.  Every time I needed an impairment point this burned up 2 NICs on my UCS equipment.  Why? Cause I couldn’t seem to figure out how to load one NIC on a UCS as a trunk port with multiple VLANs on it and have multiple WAN bridges with just 1 trunk on a switch.

So that meant, for a recent CPOC that I was doing, if I really wanted 6 impairment points (red circles in diagram below) I was going to need to eat up 12 NICs on my UCS.

onetoone

There had to be a better way…..

My friend, David Prall, was convinced it “should” work. I was equally convinced that I had tried it before and Continue reading

Larry Ellison says Amazon is ’20 years behind’ Oracle

Larry Ellison continued his assault on Amazon during his second keynote address at Oracle OpenWorld on Tuesday."Amazon Web Services are simply not optimized for the Oracle Database. I'll go further than that: Amazon Web Services aren't optimized for their own databases either, as you will see," he said, while showing off a set of benchmarks that showed Oracle Database performing several times faster on Oracle's cloud than it does on Amazon's cloud. "It doesn't get better, it gets worse."To read this article in full or to leave a comment, please click here

14% off iHome iPL23 White Clock Radio with Lightning Dock, Support for iPhone 7/7+ – Deal Alert

iHome's iPL23 is compatible with iPhones 5, 6 and 7 (including Plus models), features premium speakers, a Lightning charging dock, FM radio, and alarm clock in one compact device. This handy radio clock charges Lightning-capable iPhone and iPod devices, while letting you wake or sleep to your favorite songs, podcasts, audio books or FM radio station. Gradual wake/sleep function slowly increases or decreases volume as you drift off, or come to. A USB port allows for simultaneous charging of your iPad or Apple Watch as well. The iPL23 in white has been discounted 14% from $69.95 to $59.95. To read this article in full or to leave a comment, please click here

D-Wave will ship a 2,000-qubit quantum computer next year

Forget PCs and servers: D-Wave Systems is looking into the future with its quantum computer, up to 1,000 times faster than an earlier model.The company will start shipping a quantum computer with 2,000 qubits, twice the size of its current 1,000-qubit D-Wave 2X. The D-Wave 2X is considered one of the most advanced computers in the world today.The 2,000-qubit quantum computer will be 500 to 1000 times faster than its predecessor, said Jeremy Hilton, senior vice president of systems at D-Wave.An even larger quantum computer based on a whole new processor design will come out two to three years after that, Hilton said.Today's PCs and servers could ultimately be replaced by a quantum computer, which has been researched for decades. Beyond D-Wave, companies like IBM are also building quantum computers.To read this article in full or to leave a comment, please click here

Receive alerts when your data is leaked with this tool

If you’re worried that your data might end up in the hands of a hacker, one site is offering a free service that can give you a head’s up.Baltimore-based Terbium Labs has come up with a product called Matchlight, which crawls the dark recesses of the internet, looking for stolen data that’s circulating on the black market.On Tuesday, Terbium Labs opened the product to the public. That means any user can sign up to have five of their personal records monitored for free.To read this article in full or to leave a comment, please click here

Receive alerts when your data is leaked with this tool

If you’re worried that your data might end up in the hands of a hacker, one site is offering a free service that can give you a head’s up.Baltimore-based Terbium Labs has come up with a product called Matchlight, which crawls the dark recesses of the internet, looking for stolen data that’s circulating on the black market.On Tuesday, Terbium Labs opened the product to the public. That means any user can sign up to have five of their personal records monitored for free.To read this article in full or to leave a comment, please click here

There are just 28 internet domains on North Korea’s DNS

The internet in North Korea is an unsurprisingly small and circumscribed place – there are just 28 TLDs on the entirety of the country’s .kp domain, compared to almost 335 million globally.A misconfiguration early Tuesday morning allowed outsiders to get a rare look into the hermit kingdom’s vestigial online infrastructure, which is connected to the broader internet via China. It was detected by the TLDR Project, an automated, ongoing effort to track all global zone transfer requests among DNS providers, and log them to GitHub.+ALSO ON NETWORK WORLD: Why this hospital is moving to Amazon’s cloud + Be careful not to fall for these ransomware situationsTo read this article in full or to leave a comment, please click here

Black Friday 2016 tech ads will be leaking before you know it

Black Friday 2016 is still about 2 months away, but the first ad leaks touting bargains on everything from the latest iPhones to tablets, TVs and PCs could surface by the end of next month. Look for Amazon to once again push the definition of Black Friday, with sales starting at the beginning of November (hey, they've already had Prime Day).FROM THE ARCHIVES: 40+ jaw dropping Black Friday 2015 tech dealsTo read this article in full or to leave a comment, please click here