This question on reddit For example, I’m going through a Cisco Live presentation on troubleshooting ASR routers, and the first 50 slides or so are completely dedicated to describing the Route Processors, Packet Engines, ASICs, Buffers, etc., and the different paths that packets can take through the hardware. While that’s all obviously important to the […]
The post QAA: How Important is it to Understand Hardware Architecture? appeared first on EtherealMind.
On today's Network Break we analyze Dell's move back onto the public market, Arista's partnerships for container networking, startup funding, new products, and more of what's happening in IT.
The post Network Break 215: Dell Buys Its Way To Wall Street; Arista Inks Container Partnerships appeared first on Packet Pushers.
The standards body insists there is no need for panic, as it announces a three-month delay in the completion of the Release 15 standard.
A lack of support: Australia’s new law requiring technology companies to give law enforcement agencies access to customers’ encrypted communications isn’t so popular with the public, The Economist reports. The government there received 343 public comments leading up to the vote in favor of the law, and only one person expressed support.
Minor offenses: Meanwhile, critics of the Australian law say it may be used to target suspects of minor crimes, The Guardian says. The law is neither “appropriate or proportionate,” one lawyer says. One of Australia’s spy chiefs is defending the law, however, saying it will be used to target terrorists, pedophiles, and other criminals, not law-abiding citizens, ABC News Australia reports.
Getting tough: The Russian parliament is planning to vote on a package of bills intended to increase penalties for spreading fake news, Euronews reports. One of the bills would allow for fines and a short jail sentence for people “expressing obvious disrespect” for society and state officials. The Dutch government is taking a different approach to fake news, by planning an online campaign to make voters aware of disinformation and help them recognize it, NLTimes says.
China vs. trolls: The Chinese government has detained 30 members of Continue reading
Organizations embarking on a digital transformation utilizing Agile concepts should give close consideration to these principles and the accompanying Do's and Don'ts.
2018 was our busiest year ever… we created or updated 19 webinars, for a total of 32 live webinar sessions.
We wrapped up the 2018 webinars with Storage December featuring Hyper-Converged Infrastructure with Howard Marks and NVMe-over-Fabrics with J Metz (I never thought I would enjoy storage technology discussions, but Howard and J were brilliant)… and this is what we’ve been doing the rest of the year:
Read more ...Stilgherrian is a long time IT journalist in Australia and trustworthy source for news. This article details the laws that Australia has passed.
The post Response: Australian Encryption Laws Explained appeared first on EtherealMind.
“Eye Care” Add dark mode to Chrome via extension. Source seems to check out. Source Web Site: Dark Reader – https://darkreader.org/ Also has extension for Firefox and Safari. Link: Dark Reader – Chrome Web Store – https://chrome.google.com/webstore/detail/dark-reader/eimadpbcbfnmbkopoojfekhnkhdbieeh/related Side Note: All those years of brightest possible monitors declaiming about number of NITS a screen and now […]
The post Tools: Dark Mode Chrome Extension appeared first on EtherealMind.
While virtual desktops have successfully helped address security and operational challenges, IT organizations still have concerns about a growing threat landscape and an expanded security perimeter that they need to protect, especially in public cloud environments. Malware, phishing, and other emerging advanced threats can be used to compromise a virtual desktop to serve as jumping off point for an attacker to move laterally into the rest of the network. Until now, customers could secure their VMware Horizon deployments in on-premises data centers with VMware NSX. We are happy to announce that NSX can now also secure virtual workloads deployed by VMware Horizon Cloud on Microsoft Azure, providing a more robust security posture in cloud-hosted virtual desktop environments in Microsoft Azure.
It’s been a great year for Horizon Cloud on Microsoft Azure. This service offering allows customers to easily pair their own Microsoft Azure capacity with the intuitive Horizon Cloud control to quickly deliver virtual desktops and apps to end-users in a matter of hours. There is a lot of momentum from customers as they adopt Horizon Cloud to deliver virtual desktops and application from their own Microsoft Azure infrastructure to any device, anywhere.
One of the key features of the Continue reading
I’m spending the week in some great company at Security Field Day with awesome people. They’re really making me think about security in some different ways. Between our conversations going to the presentations and the discussions we’re having after hours, I’m starting to see some things that I didn’t notice before.
The Weekly Show returns to the University of Idaho to continue the real-world network design session we started in Show 418. Today's episode focuses on the university's wireless architecture and design with guests Brian Jemes, Mike Rusca, and Jake Snyder. We cover 5Ghz, PoE, next-gen APs, and more.
The post Weekly Show 420: Real-World Network Design Part 2 appeared first on Packet Pushers.
SDxCentral Weekly Wrap for December 14, 2018: IHS SD-WAN report showed 23 percent revenue surge, VMware paid $550 million for Kubernetes boost from Heptio, and more of what you missed this week.
Watch the embedded demo below or view on the NSX YouTube channel here to see several cool NSX-T networking and security capabilities within VMware Cloud on AWS. The demo shows connectivity from VMware Cloud on AWS SDDC to on-prem via AWS Direct Connect Private VIF. Access to native AWS services from VMware Cloud on AWS SDDC is also shown. Additionally, Edge security policies, distributed firewall/micro-segmentation, and port mirroring are demonstrated. Continue reading
CNCF claimed 8,000 attendees and an additional 2,000 that were on a waitlist to attend this week's event. I think those on the waitlist snuck in.