Archive

Category Archives for "Networking"

We Must Continue to Advocate Passionately and Fearlessly: An Interview with Our CEO, Kathy Brown

Late November, Kathy Brown announced that she would be stepping down as CEO of the Internet Society. While preparing for her next chapter, she reflected on her time at the Internet Society and shared her thoughts on how the Internet itself has evolved during her tenure.

The Internet Society: What are the biggest changes you’ve seen in the Internet since you joined the Internet Society?

Kathy Brown: When I joined the Internet Society nearly five years ago, there were about 3 billion people online. Since then, that number has grown by almost a billion, but, still, not everyone is connected. The Internet Society has helped bring Internet access to the hardest-to-reach places on earth, including remote regions in the Caucasus and indigenous communities in South America, but there remain twice as many people online in the developed world than in the developing world, and the digital gender gap is widening.

There’s also been a trend toward consolidation, with fewer companies controlling more and more, and the Internet getting increasingly centralized. We’ve seen governments using the Internet in good, but also bad ways, such as shutdowns, and we’ve seen criminals finding ways to exploit it.

“Kathy undertook the leadership of Continue reading

History Of Networking – Ross Callon – MPLS

Recorded in-person at the most recent meeting of the IETF, Ross Callon joins the Network Collective crew (as well as special guest Ethan Banks from Packet Pushers) to share some stories from the creation of MPLS.

Ross Callon
Guest
Ethan Banks
Guest
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Ross Callon – MPLS appeared first on Network Collective.

BrandPost: Loyal to a Fault: Why Your Current DNS May Be Exposing You to Risk

Ask seasoned IT professionals what they dislike most about their infrastructure, and they’ll answer in unison: Change. IT, network and security professionals all rely on tried-and-true products to keep the business humming along, but is doing so exposing them to new risks? This post looks at some hidden risk factors present in many of today’s DNS environments, and what enterprises should be doing now to ameliorate them.There are very few organizations more change-averse than enterprise IT professionals – especially their network and security teams. With network stability (read uptime) at the heart of their existence, reliance on known products and services can become a crutch – and a blindfold, limiting the ability to objectively consider new infrastructure solutions. As the advent of cloud came upon IT, many organizations needed to fight the ‘server-huggers’, who insisted that their sacred server or device located in the datacenter was the only way to run a specific application or perform a specific business function.To read this article in full, please click here

Eager to learn about the future of networking? Join us at FUTURE:NET 2018

We’re getting excited to welcome industry leading speakers to the stage at FUTURE:NET, an event VMware has been curating for the past three years. On Thursday, August 30th, luminaries from the networking industry will speak on how containers, microservices, and platforms are changing networking.

Below is a snapshot of the agenda. To learn more about each session and our speakers, check out the website.

Emin Gun Sirer, Associate Professor at Cornell
Blockchains: The Promise and Challenges Ahead for Networking

Ryland Degnan, CTO at Netifi
RSocket: Reactive Cloud-Native Networking

May Wang, CTO at Zingbox
IoT Networking & Security

Ken Owens, VP of Digital Native Architecture at Mastercard
Container Networking

Adam Casella, Co-Founder at SnapRoute
Containerized Microservices and Networking for Cloud Native

Zaid Ali Kahn, Senior Director Global Infrastructure at LinkedIn
The Self-Healing Infrastructure: LinkedIn’s Data Center Network Journey

Marco Palladino, CTO & Co-Founder at Kong
The API Management Journey from Monolith to Service Mesh

Louis Ryan, Principal Engineer at Google
Istio- A Network for Services Not Bytes

The event is almost full, but if you would like to attend, nominate yourself for an invitation here. Be sure to check back here in September for a recap of the event!

Questions? Contact Continue reading

When it comes to IP desk phones, the secondary market is the way to go

As I sit at my desk and stare at the phone in front of me, I think back to a time when “experts” predicted desk phones would no longer be needed.Well, those experts were certainly wrong. Instead, we have several options in desk phones — so many, in fact, that you may feel you need directory assistance just to get started. You're left wondering if you should go with an old favorite or try a newer model. And you're likely concerned about Cisco's announced end-of-sale and end-of-life dates for the Cisco Unified IP Phones 7945, 7965, 7975, and 7916. Are they still a good value, and will they still be available in the secondary market?Or maybe you're wondering if you should go with the Cisco 8800 Series models that came out a few years ago that were supposed to eventually replace the whole 7900 Series. Can you afford all the bells and whistles that go with the 8800 series?To read this article in full, please click here

How the L1 Terminal Fault vulnerability affects Linux systems

Announced just yesterday in security advisories from Intel, Microsoft and Red Hat, a newly discovered vulnerability affecting Intel processors (and, thus, Linux) called L1TF or “L1 Terminal Fault” is grabbing the attention of Linux users and admins. Exactly what is this vulnerability and who should be worrying about it?L1TF, L1 Terminal Fault, and Foreshadow The processor vulnerability goes by any of those names. Researchers who discovered the problem back in January and reported it to Intel called it "Foreshadow". It is similar to vulnerabilities discovered in the past (such as Spectre).This vulnerability is Intel-specific. Other processors are not affected. And like some other vulnerabilities, it exists because of design choices that were implemented to optimize kernel processing speed but exposed data in ways that allowed access by other processes.To read this article in full, please click here

How the L1 Terminal Fault vulnerability affects Linux systems

Announced just yesterday in security advisories from Intel, Microsoft and Red Hat, a newly discovered vulnerability affecting Intel processors (and, thus, Linux) called L1TF or “L1 Terminal Fault” is grabbing the attention of Linux users and admins. Exactly what is this vulnerability and who should be worrying about it?L1TF, L1 Terminal Fault, and Foreshadow The processor vulnerability goes by L1TF, L1 Terminal Fault, and Foreshadow. Researchers who discovered the problem back in January and reported it to Intel called it "Foreshadow". It is similar to vulnerabilities discovered in the past (such as Spectre).This vulnerability is Intel-specific. Other processors are not affected. And like some other vulnerabilities, it exists because of design choices that were implemented to optimize kernel processing speed but exposed data in ways that allowed access by other processes.To read this article in full, please click here

How the L1 Terminal Fault vulnerability affects Linux systems

Announced just yesterday in security advisories from Intel, Microsoft and Red Hat, a newly discovered vulnerability affecting Intel processors (and, thus, Linux) called L1TF or “L1 Terminal Fault” is grabbing the attention of Linux users and admins. Exactly what is this vulnerability and who should be worrying about it?L1TF, L1 Terminal Fault, and Foreshadow The processor vulnerability goes by L1TF, L1 Terminal Fault, and Foreshadow. Researchers who discovered the problem back in January and reported it to Intel called it "Foreshadow". It is similar to vulnerabilities discovered in the past (such as Spectre).This vulnerability is Intel-specific. Other processors are not affected. And like some other vulnerabilities, it exists because of design choices that were implemented to optimize kernel processing speed but exposed data in ways that allowed access by other processes.To read this article in full, please click here

Learning About Blockchain, Internet Governance, and Cryptocurrency

My first task as the Internet Society’s Regional Community Manager for the Middle East was to organize three events in a span of a week in three different cities around the Middle East about Blockchain with Dr. Walid Al Saqaf, Internet Society Board of Trustees, as the keynote speaker.

Amman, Beirut, and Dubai

July 8th was D-Day for Amman at the Grand Hyatt Hotel in partnership with Int@j Jordan and Tank by Omnia. July 19th was Beirut, Lebanon, at the Movenpick Beirut, co-organized with the Internet Society Lebanon Chapter. July 12th was Dubai, UAE, at DTEC Silicon Oasis Authority, co-organized with the ISOC UAE Chapter. All three cities differed in the type of attendees, but the subjects were the same: Blockchain, Internet Governance, and Cryptocurrency.

Dr. Walid Al Saqaf, along with Waheed Al Barghouti, a cryptocurrency expert, conducted a four-hour morning workshop with a live mining demo, “create your blockchain” exercise, and smart contract creation, rules, and regulations. Moreover, there was an open forum in the afternoon that included high-level government representatives as well as private and public sector attendees.

Blockchain had been ambiguous to me, yet after the first workshop I found myself knowing more and more about Continue reading

Automation Learning Approach

The world changes. The hit novel “Who moved my cheese?” written twenty years ago, has sold over 25 million copies to help with people experiencing change. For those who work with networking technology, we’re experiencing seismic activity in the world of change and new continents are forming from scattered islands. Some of these continents so to speak are unchartered and misunderstood. This generation of engineers are the explorers of the new world and the lands are ripe for pillaging.

Common feedback around learning includes:

  • I just don’t know where to begin
  • Is Python really where the world is going?
  • There is so much to learn
  • If learn a programming language, my problems are solved
  • I feel like I can’t catch up
  • There is nothing to hold on to
  • I can’t seem to drag myself out of despair

Some of this feedback has lead me to write and publish this article based on my own sanity saving methodology.

Change

The relationship between change and progress is interesting. Not all change is progress, but all progress is change. In IT, sometimes we’ve played both polar opposite parts in the “Change for change’s sake” murder novel.

Change, rate of change, disruption Continue reading

Examining partitions on Linux systems

Linux systems provide many ways to look at disk partitions. In this post, we'll look at a series of commands, each which shows useful information but in a different format and with a different focus. Maybe one will make your favorites list.lsblk One of the most useful commands is the lsblk (list block devices) command that provides a very nicely formatted display of block devices and disk partitions. In the example below, we can see that the system has two disks (sda and sdb) and that sdb has both a very small (500M) partition and a large one (465.3G). Disks and partitions (part) are clearly labeled, and the relationship between the disks and partitions is quite obvious. We also see that the system has a cdrom (sr0).To read this article in full, please click here

Data center power efficiency increases, but so do power outages

A survey from the Uptime Institute found that while data centers are getting better at managing power than ever before, the rate of failures has also increased — and there is a causal relationship.The Global Data Center Survey report from Uptime Institute gathered responses from nearly 900 data center operators and IT practitioners, both from major data center providers and from private, company-owned data centers.It found that the power usage effectiveness (PUE) of data centers has hit an all-time low of 1.58. By way of contrast, the average PUE in 2007 was 2.5, then dropped to 1.98 in 2011, and to 1.65 in the 2013 survey.To read this article in full, please click here