Archive

Category Archives for "Networking"

Coding, cloud skills are most in demand for network pros

As more companies build their businesses around software, network and data-center pros will also be looking toward software to optimize their skills.While software may not be the first thing to come to mind when dealing with data centers, IT industry watchers say experienced network and infrastructure professionals would be wise to up their code game. Popular technology trends such as public, private and hybrid cloud, Internet of Things, artificial intelligence and machine learning will prompt network and data center pros to invest their training time and dollars in better understanding the software side of the IT house. BE SURE NOT TO MISS:To read this article in full, please click here

BGP as High Availability Protocol

Every now and then someone tells me I should write more about the basic networking concepts like I did years ago when I started blogging. I’m probably too old (and too grumpy) for that, but fortunately I’m no longer on my own.

Over the years ipSpace.net slowly grew into a small community of networking experts, and we got to a point where you’ll see regular blog posts from other community members, starting with Using BGP as High-Availability protocol written by Nicola Modena, member of ExpertExpress team.

BGP in 2018 – Part1: The BGP Table

It has become either a tradition, or a habit, each January for me to report on the experience with the inter-domain routing system over the past year, looking in some detail at some metrics from the routing system that can show the essential shape and behaviour of the underlying interconnection fabric of the Internet.

BiB 068: Aporeto’s Identity Based Workload Segmentation

Aporeto is an identity-based security solution. Not only user identity, but also workload identity. That is, when using Aporeto, workloads can only talk to each other when their identity is authenticated by fingerprint and authorized by policy. Aporeto decouples the network infrastructure from security, adding a whole new dimension to microsegmentation strategies.

The post BiB 068: Aporeto’s Identity Based Workload Segmentation appeared first on Packet Pushers.

Cisco targets mobile enterprise apps with geolocation technology

Cisco is rolling out a cloud-based geolocation package it expects will help customers grow mobile location services and integrate data from those services into enterprise analytics and business applications.The package, called DNA Spaces, is comprised of Cisco’s Connected Mobile Experience (CMX) wireless suite and enterprise geolocation technology purchased from July Systems. Cisco CMX is a software engine that uses location and other intelligence gleaned from Cisco wireless infrastructure to generate analytics data and help deliver services to customers on their mobile devices.[ Check out our hands-on reviews: 5 top hardware-based Wi-Fi test tools and Mojo wireless intrusion prevention system. ] Cisco bought July last June for an undisclosed price. July provides businesses with deep and accurate analytics about who and what are in their physical locations along with the ability to act on those insights in real-time, Cisco said.To read this article in full, please click here

Cisco targets mobile enterprise apps with geolocation technology

Cisco is rolling out a cloud-based geolocation package it expects will help customers grow mobile location services and integrate data from those services into enterprise analytics and business applications.The package, called DNA Spaces, is comprised of Cisco’s Connected Mobile Experience (CMX) wireless suite and enterprise geolocation technology purchased from July Systems. Cisco CMX is a software engine that uses location and other intelligence gleaned from Cisco wireless infrastructure to generate analytics data and help deliver services to customers on their mobile devices.[ Check out our hands-on reviews: 5 top hardware-based Wi-Fi test tools and Mojo wireless intrusion prevention system. ] Cisco bought July last June for an undisclosed price. July provides businesses with deep and accurate analytics about who and what are in their physical locations along with the ability to act on those insights in real-time, Cisco said.To read this article in full, please click here

Automating Logistics To Improve Productivity

Getting work done is hindered by logistics. Logistics is work about work. It’s the work you do so that you can get something else done.

For example, there’s a workflow I use to create a podcast. Most of that work is logistical: creating a collaborative script document from a template, inviting guests to a recording channel, scheduling the recording, coordinating sponsor content, updating the production calendar, editing the episode, writing a blog post about the episode, and promoting the episode on social media.

Relatively little of the workflow is what I consider the meat of podcast creation: researching the topic and guests, writing interview questions, and recording the actual show.

I draw the line between logistics and meat by considering what I can delegate vs. what I need to do uniquely myself. Most tasks can be divided along this line.

Solving The Logistics Problem With Delegation

One way to boost productivity is to delegate logistics. Delegation frees up your time to focus on the remaining tasks requiring your unique skills.

Delegation comes in at least three forms.

  1. Humans.
  2. Software.
  3. Automation.

Some tasks can be delegated to other humans. In my case, I delegate many tasks in my business to consultants, Continue reading

The only thing constant is change

Several things of note for the near future.

As of today, I have moved into a role at Juniper networks. You will probably hear more about what I am working on over time, both here and there, and probably other places as well.

I hope to be changing platforms from WordPress to Craft in the spring; work is currently underway. This will likely mean some things about the design of this site will change; others will remain the same. Content wise, I am going to continue highlighting interesting research, soft skills, and networking technologies, but I will be trying to focus a bit more on disaggregation in all of these areas, rather than just floating around all over the place.

More as 2019 develops.

Top 10 IoT vulnerabilities

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks.But what exactly are the biggest problems and vulnerabilities to avoid when building, deploying, or managing IoT systems? And, more to the point, what can we do to mitigate these issues?To read this article in full, please click here

Top 10 IoT vulnerabilities

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks.But what exactly are the biggest problems and vulnerabilities to avoid when building, deploying, or managing IoT systems? And, more to the point, what can we do to mitigate these issues?To read this article in full, please click here

Top 10 IoT vulnerabilities

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks.But what exactly are the biggest problems and vulnerabilities to avoid when building, deploying, or managing IoT systems? And, more to the point, what can we do to mitigate these issues?To read this article in full, please click here

Orange Matter: Silo-Busting and Dream-Dashing

Orange Matter Logo

I’ve been blogging for Solarwinds recently, posting on Orange Matter, with a cross-post to the Thwack Geek Speak forum. I love automation, but it seems that dreams of a smooth customer experience can be destroyed by the persistence of engineering silos in many organizations.

This post appeared on Orange Matter as “Silo-Busting and Dream-Dashing; More Fun With Automation“, but I’m also linking to the version posted on Thwack, mainly because that format allowed me to use more images and be slightly more irreverent. Actually, quite a lot more irreverent in this particular case…

Silo Busting Automation

I’d love it if you were to take a moment to visit and read, and maybe even comment!

If you liked this post, please do click through to the source at Orange Matter: Silo-Busting and Dream-Dashing and give me a share/like. Thank you!