Archive

Category Archives for "Networking"

Is an SD-WAN managed service right for you?

For enterprises considering an SD-WAN solution, one of the key choices will be who will implement and manage it.For some enterprises this is a relatively straightforward decision; for others the choice may require more deliberation. In either case, best-practice sourcing dictates that this decision be made up front – to achieve exceptional results, the sourcing strategy, approach and execution following must be tailored to the desired self-managed or fully-managed solution. [ Also see What to consider when deploying a next generation firewall. | Get regularly scheduled insights by signing up for Network World newsletters. ] If you have a strong and sufficiently sized internal networking team with associated software/routing and other engineering competencies, taking on the implementation of SD-WAN is more than feasible. There may still need to be development of new skill-sets to take advantage of the technology and fully understand the flavor of SD-WAN chosen.To read this article in full, please click here

Is an SD-WAN managed service right for you?

For enterprises considering an SD-WAN solution, one of the key choices will be who will implement and manage it.For some enterprises this is a relatively straightforward decision; for others the choice may require more deliberation. In either case, best-practice sourcing dictates that this decision be made up front – to achieve exceptional results, the sourcing strategy, approach and execution following must be tailored to the desired self-managed or fully-managed solution. [ Also see What to consider when deploying a next generation firewall. | Get regularly scheduled insights by signing up for Network World newsletters. ] If you have a strong and sufficiently sized internal networking team with associated software/routing and other engineering competencies, taking on the implementation of SD-WAN is more than feasible. There may still need to be development of new skill-sets to take advantage of the technology and fully understand the flavor of SD-WAN chosen.To read this article in full, please click here

A New Voice Joins the Chorus: Welcome to the Colombia Chapter!

A new Internet Society Chapter has been founded within the Regional Bureau in Latin America & Caribbean. The creation of the Colombia Chapter is today officially announced at Universidad del Rosario, in Bogotá.

Our desire is to extend a gracious and inclusive welcome to all the 67 founding members that have been active members of the Internet Society for several years, and to the ones that have recently joined the community to be part of the Chapter.

The Chapter invites you to join the live broadcasting starting at 8:00 AM (UTC-5) with eminent guests speakers such as Juanita Rodriguez Kattah, Former Vice Minister of Digital Economy, Hugo Sin Triana, Director of Innovation in Info Projects, Valérie Gauthier, Director of the Department of Applied Mathematics and Computer Science (MACC) at the University of Rosario, Nancy Quiros, the Internet Society’s Chapter Development Manager for Latin America and Caribbean Region, and Javier Pinzon, Member of the Colombian Internet Governance Forum.

The large attendance (approximately 120 participants) at the launching event, speaks to the need for a Chapter to join the Colombian community’s efforts to ensure an open, globally connected, trustworthy and secure Internet for everyone.

The Chapter will encourage the Continue reading

Video: What Problem Are We Solving with SDDC?

Remember the Software-Defined Data Centers hype? While I covered SDDC concepts and technologies for years in my webinars and workshops, I never created an introductory webinar on the topic.

That omission has been fixed in late August – SDDC 101 webinar is available as part of free subscription, and as always I started with the seemingly simple question: What problem are we trying to solve?

Intelligent Network, Intelligent Operator

Maybe I’m old school, but I’m just not into black box networking.  Especially if critical services are dependent on my network infrastructure.  I wore those shoes for 19 years, so this feeling has burned into my psyche through many real world experiences.  I don’t think I’m alone in this thinking.  

When bad things happen to network users, all eyes are on the physical network team, even when it’s not a physical network problem.  The physical network is guilty until it can be proven otherwise.  So it’s only fair that physical network operators are skeptical of technology whose inner workings are unknowable.  Waiting on your network vendor’s technical support team isn’t an option when the CIO is breathing down your neck.  Especially if a mitigation exists that can be acted on immediately.  

That said, there is indeed a limit to the human ability.  It is increasingly lossy as the number of data points grow.  Moreover, the levels of ability are inconsistent across individuals.  Box level operations leaves it up to the operator to conceptualize the physical network state as a whole in his/her head and this generally results in Continue reading

Data sharing the main driver for IoT projects

Enterprises plan to invest more in Internet of Things (IoT)-related technologies in 2019, and more companies are jumping on board the IoT bandwagon. The average investment, however, remains rather modest.So says Zebra Technologies’ second annual Intelligent Enterprise Index (PDF). Zebra specializes in endpoint devices for sectors such as retail, medical, and industrial, so IoT is on its radar. The index is based on 11 metrics, and the survey was done earlier this year with IT leaders from nine different countries.To read this article in full, please click here

Data sharing is the main driver for IoT projects

Enterprises plan to invest more in Internet of Things (IoT)-related technologies in 2019, and more companies are jumping on board the IoT bandwagon. The average investment, however, remains rather modest.So says Zebra Technologies’ second annual Intelligent Enterprise Index (PDF). Zebra specializes in endpoint devices for sectors such as retail, medical, and industrial, so IoT is on its radar. The index is based on 11 metrics, and the survey was done earlier this year with IT leaders from nine different countries.To read this article in full, please click here

Thought: Face-to-face is effective, No One Talks About How much it costs

This HBR article from April 2017 highlights a researcher talking about their paper that face-to-face is more effective than email. Well, duh. However, prior to making their requests, we asked participants in each condition to predict how many of the 10 strangers they asked would agree to fill out the survey. Participants in the face-to-face […]

The post Thought: Face-to-face is effective, No One Talks About How much it costs appeared first on EtherealMind.

Kindergarten Tech Cop: The Job I Never Wanted

This month, we’ve asked parents to share their experiences of raising kids in the tech age. Today’s guest author is Sara Given, creator of the viral blog “It’s Like They Know Us,” which skewers the myth of the perfect parent. She’s also the author of Parenting Is Easy: You’re Probably Just Doing It Wrong.

“Mom, what’s your passcode?”

I looked up to find my 5-year-old daughter jabbing her finger at my iPhone screen. She continued, “My school iPad has a passcode. What’s yours? I need to take pictures of the cat.”

This was a tame request compared to her other inquiries, (“Can I have a little brother?”), but it bothered me for two reasons: First, I knew that if I gave her that passcode, she would immediately take 5,000 pictures of the floor. And second, I hadn’t considered that at age 5 she’d already be so immersed in technology. That she’d know the lingo. That she probably already had more Instagram followers than me. #floorpics

While my daughter chattered away about the cartoon-character math app she’d been using in class, I found myself facing a dilemma: I want to limit my child’s exposure to Continue reading

IPFire on Raspberry Pi 3B

IPFire is a modular opensource firewall distribution with a primary objective of security. IPFire employs a Stateful Packet Inspection (SPI) firewall, which is built on top of netfilter (the Linux packet filtering framework). The modular designs allows to extend basic functionality by installation of add-ons that can be easily deployed with the IPFire package management system - pakfire. Updates are digitally signed and encrypted.

During the installation of IPFire, the network is configured into different, separate segments (zones). These different segments may be enabled separately, depending on your requirements. Each segment represents a group of computers who share a common security level.

Green represents a "safe" area. This is where all regular clients will reside. It is usually comprised of a wired, local network. Clients on Green can access all other network segments without restriction. Red indicates "danger" or the connection to the Internet. Nothing from Red is permitted to pass through the firewall unless specifically configured by the administrator. Blue represents the "wireless" part of the local network. Since the wireless network has the potential for abuse, it is uniquely identified and specific rules govern clients on it. Clients on this network segment must be explicitly allowed Continue reading

Research: BGP Routers and Parrots

The BGP specification suggests implementations should have three tables: the adj-rib-in, the loc-rib, and the adj-rib-out. The first of these three tables should contain the routes (NLRIs and attributes) transmitted by each of the speaker’s peers. The second table should contain the calculated best paths; these are the routes that will be (or are) installed in the local routing table and used to build a forwarding table. The third table contains the routes which have been sent to each peering speaker. Why three tables? Routing protocols standards are (sometimes—not always) written to provide the maximum clarity to how the protocol works to someone who is writing an implementation. Not every table or process described in the specification is implemented, or implemented the way it is described.

What happens when you implement things in a different way than the specification describes? In the case of BGP and the three RIBs, you can get duplicated BGP updates. What do parrots and BGP have in common describes two situations where the lack of a adj-rib-out can cause duplicate BGP updates to be sent.

David Hauweele, Bruno Quoitin, Cristel Pelsser, and Randy Bush. 2016. “What Do Parrots and BGP Rotuers Have in Common?” Continue reading

History Of Networking – Bill Yeager – Routing Software

Bill Yeager, an early networking pioneer who is credited with inventing the first multi-protocol router, joins Network Collective to talk about his work in the beginning days of networking.

Bill Yeager
Guest
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Bill Yeager – Routing Software appeared first on Network Collective.

What’s hot in enterprise networking for 2019

With 2019 just around the corner there's a lot of  developments and advances coming that will affect how enterprises make use of technologies for SD-WAN, IoT, Wi-Fi, data centers, the cloud and more. Here's a selection of some of the coming trends that industry pros see coming next year.What will be hot for Cisco in 2019? Getty Images Software, software and more software.  That seems to be the mantra for Cisco in 2019 as the company pushes software-defined WANs, cloud partnerships, improved application programs and its over-arching drive to sell more subscription-based software licenses. Check it out.To read this article in full, please click here