Archive

Category Archives for "Networking"

Community Dispatch: New Hawaii Chapter Says the Internet Still a Force for Good

My first exposure to the Internet Society was back in 1995 when they held the 5th Annual INET International Networking Conference in Honolulu, Hawaii. It was a time when accessing the Internet was a new experience, at least for the public. Terms like hyperlinks, HTTP, FTP, Pine, and the World Wide Web were exciting and the innocence of connecting the world was full of potential.

Fast forward 25 years and the Internet is truly a worldwide resource. With the advent of smartphones, high-speed Internet, wireless technologies, and robust web protocols, accessing and communicating has become a rich experience. But within a quarter of a century, the innocence of the Internet has also tarnished. Not a day goes by without a story in the media about security breaches, privacy lost, horrible things broadcast over social media, online bullying, surveillance, hate speech, and the list goes on.

It is in this environment that we’re launching the Internet Society Hawaii Chapter. The mission of the Internet Society still rings true today: to bring the Internet of opportunity to everyone everywhere, an Internet that is open, globally connected, secure, and trustworthy. These principles apply whether you live in an urban center or rural community. Continue reading

Heavy Networking 456: How To Choose A Higher Ed Program For An IT Career

Today's Heavy Networking explores how to select a higher-ed program for your computer science education, including the key elements of a CS degree, community college vs. 4-year institutions, measuring educational costs and returns, and more. Our guest is Aaron Francis, a systems engineer and instructor.

The post Heavy Networking 456: How To Choose A Higher Ed Program For An IT Career appeared first on Packet Pushers.

BrandPost: Mobile Support: Are Your Employees Getting What They Need?

We’re going to go out on a limb and say most employees bring their own mobile devices to work. You probably do too, and it’s not a bad idea. Using a smartphone or tablet you’re already familiar with – and to which you’re already attached at the hip – often helps you to be more productive as an employee. For companies, embracing the bring-your-own-device trend isn’t a bad idea either. That individual boost in productivity compounds across the enterprise.But that doesn’t mean it’s as easy as turning on the green light and letting employees have at it. Those mobile devices need to be supported – and at a high service level end users have come to expect – or companies risk taking a hit on employee productivity and job satisfaction. You can thank places like Apple’s Genius Bar for raising the bar on support expectations. That’s the same level of first-class support employees expect at work and the standard IT support teams are being held to today.To read this article in full, please click here

BGP Blunder

Another week, another BGP hijack. This time a steel company in western Pennsylvania got surprised with a sizable portion of the Internet’s traffic. In this Network Collective short take, Nick Buraglio joins me to talk about the recent BGP blunder, its causes, some of the reactions, and discuss the BGP optimization tool that sparked the whole issue.

Relevant BGP Security episode with Geoff Houston.

Jordan Martin
Host

The post BGP Blunder appeared first on Network Collective.

Cisco sounds warning on 3 critical security patches for DNA Center

Cisco issued three “critical” security warnings for its DNA Center users – two having a Common Vulnerability Scoring System rating of 9.8 out of 10.The two worst problems involve Cisco Data Center Network Manager (DCNM).  Cisco DNA Center controls access through policies using Software-Defined Access, automatically provision through Cisco DNA Automation, virtualize devices through Cisco Network Functions Virtualization (NFV), and lower security risks through segmentation and Encrypted Traffic Analysis. More about SD-WAN How to buy SD-WAN technology: Key questions to consider when selecting a supplier How to pick an off-site data-backup method SD-Branch: What it is and why you’ll need it What are the options for security SD-WAN? In one advisory Cisco said a vulnerability in the web-based management interface of DCNM could let an attacker obtain a valid session cookie without knowing the administrative user password by sending a specially crafted HTTP request to a specific web servlet that is available on affected devices. The vulnerability is due to improper session management on affected DCNM software.To read this article in full, please click here

Cisco sounds warning on 3 critical security patches for DNA Center

Cisco issued three “critical” security warnings for its DNA Center users – two having a Common Vulnerability Scoring System rating of 9.8 out of 10.The two worst problems involve Cisco Data Center Network Manager (DCNM).  Cisco DNA Center controls access through policies using Software-Defined Access, automatically provision through Cisco DNA Automation, virtualize devices through Cisco Network Functions Virtualization (NFV), and lower security risks through segmentation and Encrypted Traffic Analysis. More about SD-WAN How to buy SD-WAN technology: Key questions to consider when selecting a supplier How to pick an off-site data-backup method SD-Branch: What it is and why you’ll need it What are the options for security SD-WAN? In one advisory Cisco said a vulnerability in the web-based management interface of DCNM could let an attacker obtain a valid session cookie without knowing the administrative user password by sending a specially crafted HTTP request to a specific web servlet that is available on affected devices. The vulnerability is due to improper session management on affected DCNM software.To read this article in full, please click here

Cisco sounds warning on 3 critical security patches for DNA Center

Cisco issued three “critical” security warnings for its DNA Center users – two having a Common Vulnerability Scoring System rating of 9.8 out of 10.The two worst problems involve Cisco Data Center Network Manager (DCNM).  Cisco DNA Center controls access through policies using Software-Defined Access, automatically provision through Cisco DNA Automation, virtualize devices through Cisco Network Functions Virtualization (NFV), and lower security risks through segmentation and Encrypted Traffic Analysis. More about SD-WAN How to buy SD-WAN technology: Key questions to consider when selecting a supplier How to pick an off-site data-backup method SD-Branch: What it is and why you’ll need it What are the options for security SD-WAN? In one advisory Cisco said a vulnerability in the web-based management interface of DCNM could let an attacker obtain a valid session cookie without knowing the administrative user password by sending a specially crafted HTTP request to a specific web servlet that is available on affected devices. The vulnerability is due to improper session management on affected DCNM software.To read this article in full, please click here

Undo releases Live Recorder 5.0 for Linux debugging

Linux debugging has taken a giant step forward with the release of Live Recorder 5.0 from Undo. Just released on Wednesday, this product makes debugging on multi-process systems significantly easier. Based on flight recorder technology, it delves more deeply into processes to provide insight into what’s going on within each process. This includes memory, threads, program flow, service calls and more. To make this possible, Live Recorder 5.0's record, replay and debugging capabilities have been enhanced with the ability to: Record the exact order in which processes altered shared memory variables. It is even possible to zero in on specific variables and skip backward to the last line of code in any process that altered the variable. Expose potential defects by randomizing thread execution to help reveal race conditions, crashes and other multi-threading defects. Record and replay the execution of individual Kubernetes and Docker containers to help resolve defects faster in microservices environments. The Undo Live Recorder enables engineering teams to record and replay the execution of any software program -- no matter how complex -- and to diagnose and fix the root cause of any issue in test or production.To read this article in full, please Continue reading

Undo releases Live Recorder 5.0 for Linux debugging

Linux debugging has taken a giant step forward with the release of Live Recorder 5.0 from Undo. Just released on Wednesday, this product makes debugging on multi-process systems significantly easier. Based on flight recorder technology, it delves more deeply into processes to provide insight into what’s going on within each process. This includes memory, threads, program flow, service calls and more. To make this possible, Live Recorder 5.0's record, replay and debugging capabilities have been enhanced with the ability to: Record the exact order in which processes altered shared memory variables. It is even possible to zero in on specific variables and skip backward to the last line of code in any process that altered the variable. Expose potential defects by randomizing thread execution to help reveal race conditions, crashes and other multi-threading defects. Record and replay the execution of individual Kubernetes and Docker containers to help resolve defects faster in microservices environments The Undo Live Recorder enables engineering teams to record and replay the execution of any software program -- no matter how complex -- and to diagnose and fix the root cause of any issue in test or production.To read this article in full, please Continue reading

Juniper Mist Edge – SD Campus Emerges

Juniper’s Mist acquisition is getting a dose of the SDN Campus and its coming up in a nasty rash. The symptoms are: an overlay network using L2TPv3 (aka MPLS for ordinary people) and and software controller badged AI-driven microservice cloud architecture insight in the user experience. Actually, before we press on, this is the twaddle […]

The post Juniper Mist Edge – SD Campus Emerges appeared first on EtherealMind.

Seagate, Cloudian partner for high-density storage as a service

Data storage software vendor Cloudian has teamed up with Seagate Technology to offer a private cloud storage platform aimed at artificial intelligence (AI) and network-edge workloads. The two companies said they plan to deliver exabyte-scale private cloud storage on-premises while still compatible with Amazon Web Services’ S3 storage.The new product is a mouthful and one only lawyers could have come up with: Cloudian HyperStore Xtreme, Powered by Seagate. Cloudian specializes in object storage platforms, which are already compatible with AWS S3, and Seagate is a major provider of hard disk technology along with Western Digital. In announcing the deal, Seagate said S3 was the motivator for making the alliance.To read this article in full, please click here

Seagate, Cloudian partner for high-density storage as a service

Data storage software vendor Cloudian has teamed up with Seagate Technology to offer a private cloud storage platform aimed at artificial intelligence (AI) and network-edge workloads. The two companies said they plan to deliver exabyte-scale private cloud storage on-premises while still compatible with Amazon Web Services’ S3 storage.The new product is a mouthful and one only lawyers could have come up with: Cloudian HyperStore Xtreme, Powered by Seagate. Cloudian specializes in object storage platforms, which are already compatible with AWS S3, and Seagate is a major provider of hard disk technology along with Western Digital. In announcing the deal, Seagate said S3 was the motivator for making the alliance.To read this article in full, please click here

IoT roundup: Robot boats, AT&T makes IoT partner deals

There’s plenty of IoT technology coming into the automotive sector – sophisticated fleet management systems, in-car entertainment and connectivity - but the real pot of gold is fully autonomous transport, which is inching closer all the time.One piece of news on that front comes out of MIT, where researchers announced earlier this month that they are collaborating with the Amsterdam Institute for Advanced Metropolitan Solutions to create a “roboat,” which leverages GPS, cameras and other sensors, alongside on-board connectivity and compute, to create autonomous boats for travel along the Dutch capital’s 165 canals.To read this article in full, please click here