Archive

Category Archives for "Networking"

IDG Contributor Network: 4 considerations when replacing managed WAN services with SD-WAN

The enterprise wide area networks are mission-critical resources for most enterprises. And when it came to managing and running the WAN, enterprises could choose between two distinct models: Do it Yourself (DIY) or managed WAN services. But with the evolution of SD-WANs, we’re seeing a new type of telco solution that merges elements of both capabilities.Traditional WAN management models With DIY, enterprise IT procures last-mile access at a location and deploys routers, WAN optimization, and network security appliances from several vendors. Continuous monitoring and management is done in house or via a managed service provider. In short, enterprise IT owns the complex task of maintaining, configuring and monitoring the WAN for availability and optimal performance.To read this article in full, please click here

Complexity Sells

According to Roman philosophers, simplicity is the hallmark of truth. And yet, networks have become ever more complex over time. Why is this? Because complexity sells. In this short take, I talk about why complexity sells, and some of the mental habits you can use to overcome our natural tendency to prefer the complex.

The Next Installment of Our CCIE Security V5 Technology Series is Here!

This course was created by Piotr Kaluzny and is 2 hours and 32 minutes long. It consists of multiple videos where the Instructor discusses all relevant theoretical concepts and technologies, (in-depth explanations, whiteboarding) and shows how to implement them on the current CCIE Security v5 lab exam hardware.



Why You Should Watch:

Security is no longer just an “important” component of an organization. A constantly-increasing number of aggressive cyber criminals launch their attacks not only from the outside, but also inside of the organization, making security an inherent component of any modern network/system design.

This course, like all other courses that are part of the “CCIE Security v5 Technologies” series, is meant to teach you Cisco security technologies and solutions using the latest industry best practices to secure systems and environments against modern security risks, threats, vulnerabilities, and requirements.


Who Should Watch:

This course is not only intended for students preparing to the current CCNA/CCNP/CCIE Security exam, but also for experienced Network (Security) Engineers or Administrators looking to refresh their knowledge on important Network Security concepts before moving forward with other certifications.


What You’ll Learn:

By completing this course, you will understand and learn about the different Layer 2 attacks and Continue reading

IDG Contributor Network: Networking anomalies

Recently, I had the great opportunity to discuss network security over dinner with one of the world’s best security practitioners. I learned that keeping bad actors from eventually getting inside a network is nearly impossible. While we maintain our vigilance at our borders over time we should assume our network would be penetrated, so the key to preventing exfiltration (which generally follows) is to look for networking anomalies.Look for network uses that are abnormal, unusual, or different in some way from the norm. Techniques for doing this “hunting” are expensive to implement and hard to interpret with frequent false positives but are a necessary evil.To read this article in full, please click here

Network Break 192: Dell Goes Public Again; Vodafone Trials Whitebox Optical

Take a Network Break! Dell Technologies is heading back to the public market, Vodafone tests a whitebox optical switch, and an LTE vulnerability rears its head.

Diane Bryant leaves Google Cloud after less than a year. Is Intel beckoning?

A Swedish private equity firm spins out SUSE, Micron products get banned in China, ZTE shuffles its executive ranks to comply with US requirements, and China approves Marvell’s acquisition of Cavium.

We’ve got links to all these stories after our sponsor messages.

Sponsor: InterOptic

InterOptic offers high-performance, high-quality optics at a fraction of the cost. If you re not doing optics correctly, you re going to pay for it upfront (and then later too). Don t be fooled by lesser optics. The difference between generic third-party and brand-equivalent optics matters.

Sponsor: Packet Pushers Ignition

The Packet Pushers have launched a brand new membership site called Ignition. Ignition offers free and premium memberships and hosts exclusive content for subscribers, including videos, reports, blogs, and more. Check it out at ignition.packetpushers.net.

Show Links:

Dell moves to go public, spurns IPO – Reuters

Vodafone begins its trek with Voyager – Cumulus Networks Blog

Vodafone deploys TIP s Voyager in a live network Continue reading

IDG Contributor Network: Solving for serverless: How do you manage something that’s not there?

Function-as-a-service (FaaS) technologies, including AWS Lambda, Azure Functions and IBM/Apache OpenWhisk, are experiencing mass adoption, even in private clouds, and it’s easy to see why. The promise of serverless is simple: developers and IT teams can stop worrying about their infrastructure, system software and network configuration altogether. There’s no need to load-balance, adjust resources for scale, monitor for network latency or CPU performance. Serverless computing can save you a lot of time, money and operational overhead, if you play your cards right.Say goodbye to the idle instance There’s also less waste with serverless computing. You only pay for infrastructure in the moment that code gets executed (or, each time a user processes a request). It’s the end of the server that just sits there. But with all these advantages, IT practitioners are also faced with an avalanche of complexity and new challenges.  To read this article in full, please click here

IDG Contributor Network: Solving for serverless: How do you manage something that’s not there?

Function-as-a-service (FaaS) technologies, including AWS Lambda, Azure Functions and IBM/Apache OpenWhisk, are experiencing mass adoption, even in private clouds, and it’s easy to see why. The promise of serverless is simple: developers and IT teams can stop worrying about their infrastructure, system software and network configuration altogether. There’s no need to load-balance, adjust resources for scale, monitor for network latency or CPU performance. Serverless computing can save you a lot of time, money and operational overhead, if you play your cards right.Say goodbye to the idle instance There’s also less waste with serverless computing. You only pay for infrastructure in the moment that code gets executed (or, each time a user processes a request). It’s the end of the server that just sits there. But with all these advantages, IT practitioners are also faced with an avalanche of complexity and new challenges.  To read this article in full, please click here

Q&A: Bill Hoffman of the Industrial Internet Consortium talks AI, IoT and more

Bill Hoffman, president of the Industrial Internet Consortium, has worked with artificial intelligence (AI) for decades. He's been with the IIC since its inception, and he worked with IIC executive director Richard Soley at various AI firms for years before that. Hoffman recently sat down with Network World's Jon Gold for a chat about IoT and the role of automation and AI.NWW: Is this what you guys expected to be working on 20-30 years ago?BF: For us it’s fascinating to see, three decades later, that the term AI actually has a good connotation. It’s funny, but a lot of the systems that we were involved with, which were primarily renamed “decision support systems” – for liability reasons, they didn’t want to call them “expert” systems – a lot of those are still functioning today. So it never really went away, it just went somewhat underground, and people said “OK, that works.”To read this article in full, please click here

IDG Contributor Network: A taxonomy of Intent-Based Networking (IBN)

You have probably heard all sorts of claims by various vendors and solutions that they are providing or supporting Intent-Based Networking (IBN), yet there is a wide range of capabilities that are all very confusing.One way to make sense of this is to apply a "maturity model" like the one used to classify the maturity level of RESTful web services implementations. The Richardson Maturity Model divides capabilities of RESTful web services into levels, starting from 0 and going up as the maturity of the implementation increases. Just like IBN, REST had received its fair share of hype. While the REST principles were clearly defined in Roy Fielding’s dissertation, in practice the REST label was attached to implementations with wildly varying levels of conformance to the original principles, starting from anything that had the words “HTTP” and “JSON” in it to full blown “hypermedia as the engine of application state.”To read this article in full, please click here

IDG Contributor Network: A taxonomy of Intent-Based Networking (IBN)

You have probably heard all sorts of claims by various vendors and solutions that they are providing or supporting Intent-Based Networking (IBN), yet there is a wide range of capabilities that are all very confusing.One way to make sense of this is to apply a "maturity model" like the one used to classify the maturity level of RESTful web services implementations. The Richardson Maturity Model divides capabilities of RESTful web services into levels, starting from 0 and going up as the maturity of the implementation increases. Just like IBN, REST had received its fair share of hype. While the REST principles were clearly defined in Roy Fielding’s dissertation, in practice the REST label was attached to implementations with wildly varying levels of conformance to the original principles, starting from anything that had the words “HTTP” and “JSON” in it to full blown “hypermedia as the engine of application state.”To read this article in full, please click here

The Week in Internet News: WhatsApp Looks to Combat the Spread of Fake News

Fake messaging: WhatsApp, the popular messaging tool, will pay researchers up to $50,000 to study the spread of fake news through its platform, notes Mashable.com. The announcement came after reports of mob lynchings in India fueled by false information spread on WhatsApp, reports the Washington Post. India’s government asked the app maker to take immediate action to stop the spread of fake news.

Defining fake news: While we’re still on the topic of fake news, Cambodia’s recent crackdown on false information is raising concerns about press freedom in the country, reports The Guardian. A new directive aimed at fake news on websites and social media allows for violators to be jailed for two years and fined US$1,000, but civil rights groups said the new rules could give “authorities the power to silence individuals at the click of a button.”

Fired by a computer: A Los Angeles worker was recently shown the door by an automated process that seemed to assume he was let go after his original manager was laid off, the BBC reports. The case could raise questions about artificial intelligence processes, but the real fix would be a more intelligent machine, The Conversation says.

AI manages Continue reading