Archive

Category Archives for "Networking"

The Serverlist Newsletter 2nd Edition: Available Now

The Serverlist Newsletter 2nd Edition: Available Now

Check out our second edition of The Serverlist below. Get the latest scoop on the serverless space, get your hands dirty with new developer tutorials, engage in conversations with other serverless developers, and find upcoming meetups and conferences to attend.

Sign up below to have The Serverlist sent directly to your mailbox.

Linux security: Cmd provides visibility, control over user activity

There's a new Linux security tool you should be aware of — Cmd (pronounced "see em dee") dramatically modifies the kind of control that can be exercised over Linux users. It reaches way beyond the traditional configuration of user privileges and takes an active role in monitoring and controlling the commands that users are able to run on Linux systems.Provided by a company of the same name, Cmd focuses on cloud usage. Given the increasing number of applications being migrated into cloud environments that rely on Linux, gaps in the available tools make it difficult to adequately enforce required security. However, Cmd can also be used to manage and protect on-premises systems.To read this article in full, please click here

Linux security: Cmd provides visibility, control over user activity

There's a new Linux security tool you should be aware of — Cmd (pronounced "see em dee") dramatically modifies the kind of control that can be exercised over Linux users. It reaches way beyond the traditional configuration of user privileges and takes an active role in monitoring and controlling the commands that users are able to run on Linux systems.Provided by a company of the same name, Cmd focuses on cloud usage. Given the increasing number of applications being migrated into cloud environments that rely on Linux, gaps in the available tools make it difficult to adequately enforce required security. However, Cmd can also be used to manage and protect on-premises systems.To read this article in full, please click here

Linux security: Cmd provides visibility, control over user activity

There's a new Linux security tool you should be aware of — Cmd (pronounced "see em dee") dramatically modifies the kind of control that can be exercised over Linux users. It reaches way beyond the traditional configuration of user privileges and takes an active role in monitoring and controlling the commands that users are able to run on Linux systems.Provided by a company of the same name, Cmd focuses on cloud usage. Given the increasing number of applications being migrated into cloud environments that rely on Linux, gaps in the available tools make it difficult to adequately enforce required security. However, Cmd can also be used to manage and protect on-premises systems.To read this article in full, please click here

Linux security: Cmd provides visibility, control over user activity

There's a new Linux security tool you should be aware of — Cmd (pronounced "see em dee") dramatically modifies the kind of control that can be exercised over Linux users. It reaches way beyond the traditional configuration of user privileges and takes an active role in monitoring and controlling the commands that users are able to run on Linux systems.Provided by a company of the same name, Cmd focuses on cloud usage. Given the increasing number of applications being migrated into cloud environments that rely on Linux, gaps in the available tools make it difficult to adequately enforce required security. However, Cmd can also be used to manage and protect on-premises systems.To read this article in full, please click here

BrandPost: How edge computing will bring business to the next level

What do embedded sensors, ecommerce sites, social media platforms, and streaming services have in common? They all produce vast volumes of data, much of which travels across the internet. In fact, Cisco estimates global IP traffic will grow to 3.3 zettabytes annually by 2021 – up three times compared to internet traffic in 2017.For many businesses, these data packets represent treasure troves of actionable information, from customers’ buying preferences to new market trends. But as the volume and velocity of data increases, so too does the inefficiency of transmitting all this information to a cloud or data center for processing.To read this article in full, please click here

BrandPost: How edge computing will bring business to the next level

What do embedded sensors, ecommerce sites, social media platforms, and streaming services have in common? They all produce vast volumes of data, much of which travels across the internet. In fact, Cisco estimates global IP traffic will grow to 3.3 zettabytes annually by 2021 – up three times compared to internet traffic in 2017.For many businesses, these data packets represent treasure troves of actionable information, from customers’ buying preferences to new market trends. But as the volume and velocity of data increases, so too does the inefficiency of transmitting all this information to a cloud or data center for processing.To read this article in full, please click here

BrandPost: How is 802.11ax different than the previous wireless standards?

Most networking groups have a wireless guy, maybe two – you might be that person. For years, the rest of the campus network group hasn’t really had to think about what they plugged into the network. Give them a gig port, PoE, probably set up a VLAN and that’s it: wireless sorted.Because when it all came down to it, it didn’t matter how many wireless users connected to the access point because only one device, the client or the access point, could transmit at one time. What’s more, a single wireless client is not going to tax a gig port. In fact, the more clients there are on an AP, the less traffic ends up on the wire since they spend more time trying to get a timeslot to transmit, like the seagulls in “Finding Nemo” yelling “Mine, mine, mine.”To read this article in full, please click here

BrandPost: How is 802.11ax different than the previous wireless standards?

Most networking groups have a wireless guy, maybe two – you might be that person. For years, the rest of the campus network group hasn’t really had to think about what they plugged into the network. Give them a gig port, PoE, probably set up a VLAN and that’s it: wireless sorted.Because when it all came down to it, it didn’t matter how many wireless users connected to the access point because only one device, the client or the access point, could transmit at one time. What’s more, a single wireless client is not going to tax a gig port. In fact, the more clients there are on an AP, the less traffic ends up on the wire since they spend more time trying to get a timeslot to transmit, like the seagulls in “Finding Nemo” yelling “Mine, mine, mine.”To read this article in full, please click here

BrandPost: The Network Gets Personal

In a competitive environment, with so much emphasis on the need for communications service providers (CSPs) to offer more personalized services to increase customer loyalty, the network plays a crucial role, explains Kent McNeil, Vice President of Software for Blue Planet. While the connection between network infrastructure and the customer relationship isn’t obvious, it is actually what drives personalization of services and competitive edge.Enhancing the customer experience and lowering churn rates are key objectives for CSPs; however, an influx of competition is challenging customer loyalty. Equally, leading-edge technologies, from devices to cloud, have created new visions for consumers and enterprises. This has significantly changed customer demands, as well as expectations about how those requirements are fulfilled. Customers expect more personalized services, with tailored offers and ease-of-use.To read this article in full, please click here

BrandPost: The Network Gets Personal

In a competitive environment, with so much emphasis on the need for communications service providers (CSPs) to offer more personalized services to increase customer loyalty, the network plays a crucial role, explains Kent McNeil, Vice President of Software for Blue Planet. While the connection between network infrastructure and the customer relationship isn’t obvious, it is actually what drives personalization of services and competitive edge.Enhancing the customer experience and lowering churn rates are key objectives for CSPs; however, an influx of competition is challenging customer loyalty. Equally, leading-edge technologies, from devices to cloud, have created new visions for consumers and enterprises. This has significantly changed customer demands, as well as expectations about how those requirements are fulfilled. Customers expect more personalized services, with tailored offers and ease-of-use.To read this article in full, please click here

Unpacking the Stack and Addressing Complaints about Content

Unpacking the Stack and Addressing Complaints about Content
Unpacking the Stack and Addressing Complaints about Content

Although we are focused on protecting and optimizing the operation of the Internet, Cloudflare is sometimes the target of complaints or criticism about the content of a very small percentage of the more than thirteen million websites that use our service. Our termination of services to the Daily Stormer website a year and a half ago drew significant attention to our approach to these issues and prompted a lot of thinking on our part.  

At the time, Matthew wrote that calls for service providers to reject some online content should start with a consideration of how the Internet works and how the services at issue up and down the stack interact with that content. He tasked Cloudflare’s policy team with engaging broadly to try and find an answer. With some time having passed, we want to take stock of what we’ve learned and where we stand in addressing problematic content online.  

The aftermath of the Daily Stormer decision

The weeks immediately following the decision in August 2017 were filled with conversations. Matthew made sure the Cloudflare team accepted every single invitation to talk about these issues; we didn’t simply put out a press release or “no comment” anyone. Continue reading

Dynamic Network Diagrams, This is what we need!

We all create network diagrams. Network Engineers create network diagrams.  But for who ? When ? How they are accurate ? Do we really need network diagrams ? Let me share my thoughts with you.    Network engineers have been creating network diagrams, physical diagrams, logical diagrams, showing Vlans , IP addresses , so many …

The post Dynamic Network Diagrams, This is what we need! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Cloudflare Signs European Commission Declaration on Gender Balanced Company Culture

Cloudflare Signs European Commission Declaration on Gender Balanced Company Culture

Last week Cloudflare attended a roundtable meeting in Brussels convened by the European Commissioner for Digital Economy and Society, Mariya Gabriel, with all signatories of the Tech Leaders’ Declaration on Gender Balanced Company Culture. Cloudflare joined this European Commission initiative late last year and, along with other companies, we are committed to taking a hands-on approach to close the digital gender divide in skills, inception of technologies, access and career opportunities.

In particular, we have all committed to implementing, promoting and spreading five specific actions to achieve equality of opportunities for women in our companies and in the digital sector at large:

  1. Instil an inclusive, open, female-friendly company culture
  2. Recruit and invest in diversity
  3. Give women in tech their voice and visibility
  4. Create the leaders of the future
  5. Become an advocate for change

The project, spearheaded by the Digital Commissioner as part of a range of actions to promote gender balance in the digital industry, allows for the exchange of ideas and best practices among companies, with opportunities to chart progress and also to discuss the challenges we face. Many companies around the table shared their inspiring stories of steps taken at company level to encourage diversity, push back against Continue reading

Building the Network Automation Source of Truth

This is one of the “thinking out loud” blog posts as I’m preparing my presentation for the Building Network Automation Solutions online course. I’m probably missing a gazillion details - your feedback would be highly appreciated

One of the toughest challenges you’ll face when building a network automation solution is “where is my source of truth” (or: what data should I trust). As someone way smarter than me said once: “You could either have a single source of truth of many sources of lies”, and knowing how your devices should be configured and what mistakes have to be fixed becomes crucial as soon as you move from gathering data and creating reports to provisioning new devices or services.

Read more ...

The Global Internet Report: Consolidation in the Internet Economy

The 2017 Global Internet Report: Paths to Our Digital Future focused attention on the significant potential of the Internet for innovation and sustainable development, but without denying or shirking the challenges it also introduces. This forward-looking analysis is a powerful advocacy tool for anyone who wants to protect and build the open Internet.

Over the past year, we spent time working with our community on a new report. It takes a closer look at one of those forces and how it may impact the future: Consolidation in the Internet Economy. Understood as growing forces of concentration, vertical and horizontal integration, and fewer opportunities for market entry and competition, this topic includes the impact of consolidating forces on all stakeholders as well as on the Internet’s underlying and evolving technology.

We chose this theme because findings from the 2017 report, and what’s happened since, are showing increasing concerns about a growing concentration of power in the Internet economy. They point to market and technical forces that may be driving consolidation at different “layers” of the Internet, from network developments and hosting services to applications. Among these trends are processes that enable some companies to own our experience at almost every stage.

Continue reading

JNCIA Junos

One of my goals for 2019 is the brush back up on networking theory/operation after the last couple of years focused on network automation. This is a bit of a brain dump about my adventure in pursuit of the JNCIA-Junos certification and the study materials I used. Preface I have worked as...