Archive

Category Archives for "ShortestPathFirst"

ShortestPathFirst Now Has a New, Shorter Domain Name – spfirst.net

ShortestPathFirst now has a new, shorter domain name (spfirst.net) that we intend to use for future correspondence, marketing and business initiatives. We will continue to maintain the longer domain (shortestpathfirst.net) for backward compatibility and for business continuity but for all intents and purposes will use the new domain name where possible. Stay tuned for lots …

New Juniper Networks Videos Covering Segment Routing

Juniper recently posted some new videos on their YouTube channel covering Segment Routing. These videos feature my former colleague Ron Bonica as he provides a basic overview of Segment Routing (SR) including key concepts such as paths and segments before diving into how SR simplifies traffic engineering. I definitely recommend checking these out for anyone …

Interview with Katherine Dollar, Creative Marketing Storyteller and Communications Strategist

In this interview, I sit down with Katherine Dollar, a brilliant Creative Marketing Storyteller and Communications Strategist at Moxie Blue Media. We discuss the role of storytelling in marketing campaigns and speaking engagements and why this method of relaying information resonates in a way that creates a better connection with the audience and further helps …

Interview with John Kindervag, the Godfather of Zero Trust Networking

Last month, I had the pleasure of spending a few minutes with John Kindervag, the industry-described “Godfather” and thought leader behind Zero Trust Networking. John developed these concepts during his tenure as Vice President and Principal Analyst at Forrester Research. Zero Trust, rooted in the principle of “never trust, always verify,” is primarily designed to …

Juniper Lightboard Series – Intro to Juniper Routing – Part 2

Just released the second video in my “Introduction to Juniper Routing” Lightboard Series. In this video, I cover more details around the functions and role of the Packet Forwarding Engine (PFE), and describe the difference between transit traffic and exception traffic. In my next video, I’ll cover how routes are added to the routing table, …

Juniper Lightboard Series – Intro to Juniper Routing – Part 1

Very excited to share with you my very first official lightboard video, and what better way to kick things off than to dive into one of my favorite topics — an Intro to Juniper Routing. In this first part, I cover the separation between the Control Plane and the Forwarding Plane, and introduce concepts such …

Interview with Juniper Networks Ambassador Said van de Klundert

Had a chance to sit down with Netherlands-based Fellow Juniper Networks Ambassador Said van de Klundert (JNCIE-SP #2573 and JNCIE-DC #26) at the Juniper NXTWORK 2018 conference in Las Vegas. Said is an incredibly knowledgeable network engineer, content developer and blogger, with a wealth of practical experience in the Service Provider, Data Center and Cloud …

Interview with Kevin Olivieri, Digital Content and Social Media Manager at Juniper Networks

In this inverview, I sit down with Kevin Olivieri, Digital Content and Social Media Manager at Juniper Networks. We discuss social media trends, thoughts around building out a social media and branding strategy, analysis of different social media platforms and analytics tools, and the democratization of video content. To top it off, we even get …

Interview with Juniper Networks Ambassador Nupur Kanoi

In our next Juniper Ambassador interview, I spend time with fellow Juniper Ambassador Nupur Kanoi at the Juniper NXTWORK 2018 conference in Las Vegas. We discuss her life as an Ambassador, her engineering role at Virtela, her upcoming Day One Guide “MPLS Up and Running” scheduled for release next month, and her family life back …

Interview with Juniper Networks Ambassador Pierre-Yves Maunier

In our next Juniper Ambassador interview, I spend time with fellow Juniper Ambassador and French compatriot Pierre-Yves Maunier at the Juniper NXTWORK 2018 conference in Las Vegas. We discuss his life as an Ambassador, his architecture role at Dailymotion, his thoughts on the conference around DevOps and automation, and his family life back home. Pierre’s …

Interview with Juniper Networks Ambassador Jeff Fry

In this first ever Juniper Ambassador interview, I spend time with fellow Juniper Ambassador Jeff Fry at the Juniper NXTWORK 2018 conference in Las Vegas. We discuss his life as an Ambassador, his job at Dimension Data, his recent contribution to the 2018 Juniper Ambassador’s Cookbook, his interest in DevOps and automation, and his contribution …

What Is Steganographic Malware? New Type Of Attack Hides In Images

As defenses against standard cyberattacks evolve, so do the methods of attack carried out by malicious actors. Security researchers say a type of attack known as steganographic malware is on the rise. Gary Davis, the chief consumer security evangelist at cybersecurity firm McAfee, warned of the relatively new style of attack, which involves embedding secret …

Blockchain Technology to See Growth in Next 10 years

Zhang Jian, CEO of BoChen Technology, speaks at a blockchain forum in Guiyang, Guizhou province, May 27, 2017. [Photo provided to chinadaily.com.cn] Blockchain-based application scenarios will become prosperous in the next five to 10 years as the technology continues to improve, Zhang Jian, CEO of BoChen Technology, said. BoChen Technology focuses on the infrastructure creation …

Hackers Marketing ‘Most Sophisticated’ Mac Malware Ever

Hackers with their targets set on devices running Apple’s MacOS are selling access to new, sophisticated attacks that can infect machines and hold them for ransom. The attacks, which include a malware-as-a-service (MaaS) known as MacSpy and a ransomware-as-a-service called MacRansom — both of which attackers can purchase to use to direct at a target— …

Chinese Malware ‘Fireball’ Has Infected 250 Million Devices

A malware attack dubbed Fireball has infected more than 250 million computers worldwide and is redirecting web browsers on compromised machines to generate revenue for its attackers. First discovered by cybersecurity firm Check Point Threat Intelligence, the browser-hijacking malware attack of Chinese origin has reportedly spread to 20 percent of corporate computer networks. Read: Android …

Intel’s new chip puts a teraflop in your desktop. Here’s what that means

It’s as fast as a turn-of-the-century supercomputer. Intel’s Core i9 Extreme Edition processor costs about $2,000. Intel Corporation Earlier this week in Taipei, Intel announced the most powerful desktop chip for consumers that it has ever sold. With 18 cores and a price tag of $1,999, the processor is known as a teraflop chip, meaning …
1 2 3