Archive

Category Archives for "Networking"

Most data center workers happy with their jobs — despite the heavy demands

A survey conducted by Informa Engage and Data Center Knowledge finds data center workers overall are content with their job, so much so they would encourage their children to go into that line of work despite the heavy demands on time and their brain.Overall satisfaction is pretty good, with 72% of respondents generally agreeing with the statement “I love my current job,” while a third strongly agreed. And 75% agreed with the statement, “If my child, niece or nephew asked, I’d recommend getting into IT.”To read this article in full, please click here

IDG Contributor Network: Protecting smart cities and smart people

Smart cities require protection. In a smart cities context so does the community and the individual. How do we protect these valuable and lucrative future assets? What is the role of cyber and privacy specialist in this emerging smart eco-system?You would be forgiven for believing the smart cities express has nothing but green traffic lights on its way to its final destination. Conferences are packed with eager smart sellers convincing smart buyers their “smart service” will address all their current and future woes.  Perhaps this is true. We will have cleaner air, improved waste management, and ultimately a more responsive and intuitive society. To many more, the smart revolution will deliver the longest overdue promise of all: a safer community.To read this article in full, please click here

Come See Pica8 at Dell Technologies World – and Help Save a Real-Life Pika

Having been around the block a time or two, I’ve seen my share of trade show event booth giveaways and all manner of tchotchkes, most of which find their way to a trash can before the visitor gets home. For the upcomingDell Technologies World 2019in Las Vegas, we wanted to do something different – something that would impact the world in a positive way.

So, we’ll be raffling off 100 “adoptions” of real North American pikas, as part of the National Wildlife Federation’s Adopt-a-Pika program.

A pika is a small mammal, closely related to rabbits – and it’s in trouble. As the NWF explains, “Pikas live in high mountain ecosystems that are cool and moist. Higher temperatures can cause the pikas to overheat.”

As global warming brings higher temperatures to the pika’s habitat, it’s creating real problems. Pikas can’t just go find higher ground where it’s cooler – because that higher ground is their natural habitat.

“Without our protection and help, American pikas could be the first species with the distinction of going extinct due to global warming,” the NWF says.


Helping to save the pika

To avoid that distinction, the NWF launched the “Adopt an Continue reading

Day Two Cloud 007: Digital Transformation Is More Than Just Cloud Migration

Pushing your heritage application to the cloud won't digitally transform your company any more that slapping an Autobots symbol on your car makes it a Transformer. On today's Day Two Cloud podcast, guest Martin Ehrnst delves into the nuances of digital transformation in the enterprise.

The post Day Two Cloud 007: Digital Transformation Is More Than Just Cloud Migration appeared first on Packet Pushers.

BrandPost: Clearing up confusion between edge and cloud

Edge computing and cloud computing are sometimes discussed as if they’re mutually exclusive approaches to network infrastructure. While they may function in different ways, utilizing one does not preclude the use of the other.Indeed, Futurum Research found that, among companies that have deployed edge projects, only 15% intend to separate these efforts from their cloud computing initiatives — largely for security or compartmentalization reasons.So then, what’s the difference, and how do edge and cloud work together?Location, location, locationTo read this article in full, please click here

Distributed Firewall on VMware Cloud on AWS

This blog post will provide a deep dive on the distributed firewall (DFW) on VMware Cloud on AWS (VMC on AWS). Let’s start with the basic concepts of a distributed firewall:

Distributed Firewall Concepts

The distributed firewall is an essential feature of NSX Data Center and essentially provides the ability to wrap virtual machines around a virtual firewall.

The virtual firewall is a stateful Layer 4 (L4) firewall – it’s capable of inspecting the traffic up to the Layer 4 of the OSI model: in simple terms, it means they look at IP addresses (source and destination) and TCP/UDP ports and filter the traffic based upon these criteria.

What’s unique about our firewall is that it has contextual view of the virtual data center – this means our distributed firewall can secure workloads based on VM criteria instead of just source and destination IP addresses.

Traditional firewalling is based on source and destination IPs – constructs that have no business logic or context into applications. Our distributed firewall can secure workloads based on smarter criteria such as the name of the virtual machine or metadata such as tags.

This enables us to build security rules based on business logic (using Continue reading

Applications Open: Training for New Chapter Leaders in Latin America and the Caribbean

For us at the Internet Society, the role that people play in our community is vital to carrying our message in favor of an open and trusted Internet for all. We rely on the contributions, knowledge, and experience of our members. For this reason, the Chapters of the Latin American and Caribbean region have come together to offer and implement a pilot training program for their members.

Active participation of people in their local chapter is one of the main objectives of the program. The people involved will contribute to the four focus areas of the Internet Society’s 2019 Action Plan and will adopt our narrative and tone of voice. The sessions of the program will have facilitators from the LAC region with extensive knowledge on the topics addressed. In addition there will be special sessions with participation of experts from Internet Society staff.

180 seats are available to be distributed among Chapters of the LAC region. The selected candidates will have the opportunity to be trained in Internet Governance; community networks and access; Internet technical security; or the Internet of Things and Public Policy. The general criteria for participating is published here, although it is important to emphasize Continue reading

Startup MemVerge combines DRAM and Optane into massive memory pool

A startup called MemVerge has announced software to combine regular DRAM with Intel’s Optane DIMM persistent memory into a single clustered storage pool and without requiring any changes to applications.MemVerge has been working with Intel in developing this new hardware platform for close to two years. It offers what it calls a Memory-Converged Infrastructure (MCI) to allow existing apps to use Optane DC persistent memory. It's architected to integrate seamlessly with existing applications.[ Read also: Mass data fragmentation requires a storage rethink ] Optane memory is designed to sit between high-speed memory and solid-state drives (SSDs) and acts as a cache for the SSD, since it has speed comparable to DRAM but SSD persistence. With Intel’s new Xeon Scalable processors, this can make up to 4.5TB of memory available to a processor.To read this article in full, please click here

Startup MemVerge combines DRAM and Optane into massive memory pool

A startup called MemVerge has announced software to combine regular DRAM with Intel’s Optane DIMM persistent memory into a single clustered storage pool and without requiring any changes to applications.MemVerge has been working with Intel in developing this new hardware platform for close to two years. It offers what it calls a Memory-Converged Infrastructure (MCI) to allow existing apps to use Optane DC persistent memory. It's architected to integrate seamlessly with existing applications.[ Read also: Mass data fragmentation requires a storage rethink ] Optane memory is designed to sit between high-speed memory and solid-state drives (SSDs) and acts as a cache for the SSD, since it has speed comparable to DRAM but SSD persistence. With Intel’s new Xeon Scalable processors, this can make up to 4.5TB of memory available to a processor.To read this article in full, please click here

Cisco Talos details exceptionally dangerous DNS hijacking attack

Security experts at Cisco Talos have released a report detailing what it calls the “first known case of a domain name registry organization that was compromised for cyber espionage operations.”Talos calls ongoing cyber threat campaign “Sea Turtle” and said that state-sponsored attackers are abusing DNS to harvest credentials to gain access to sensitive networks and systems in a way that victims are unable to detect, which displays unique knowledge on how to manipulate DNS, Talos stated. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key By obtaining control of victims’ DNS, the attackers can change or falsify any data on the Internet, illicitly modify DNS name records to point users to actor-controlled servers; users visiting those sites would never know, Talos reported. To read this article in full, please click here

Cisco Talos details exceptionally dangerous DNS hijacking attack

Security experts at Cisco Talos have released a report detailing what it calls the “first known case of a domain name registry organization that was compromised for cyber espionage operations.”Talos calls ongoing cyber threat campaign “Sea Turtle” and said that state-sponsored attackers are abusing DNS to harvest credentials to gain access to sensitive networks and systems in a way that victims are unable to detect, which displays unique knowledge on how to manipulate DNS, Talos stated. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key By obtaining control of victims’ DNS, the attackers can change or falsify any data on the Internet, illicitly modify DNS name records to point users to actor-controlled servers; users visiting those sites would never know, Talos reported. To read this article in full, please click here

Episode 49 – Mentorship

Mentorship can have a significant impact on early career development and in this episode we sit down to talk about what you can expect from the mentorship process, how to find a mentor, and how to be a mentor.

 


 

We would like to thank Cumulus Networks for sponsoring this episode of Network Collective.  Cumulus Networks makes networking software for the open, modern data center. It’s the only open networking software that allows you to affordably build and efficiently operate your network like the worlds largest data center operators. Cumulus also just launched a brand new certification program offering free resources, on-demand modules, live training, and a certifications exam. If you would like to learn more you can head on over to https://cumulusnetworks.com/certified

 


John Fraizer
Guest
Denise Fishburn
Guest
Trey Aspelund
Guest
Jordan Martin
Host
Eyvonne Sharp
Host
Russ White
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 49 – Mentorship appeared first on Network Collective.